Line based hash analysis of source code infringement
نویسندگان
چکیده
منابع مشابه
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Construction of Slepian-Wolf Source Code and Broadcast Channel Code Based on Hash Property
The aim of this paper is to prove theorems for the Slepian-Wolf source coding and the broadcast channel coding (independent messages and no common message) based on the the notion of a stronger version of the hash property for an ensemble of functions. Since an ensemble of sparse matrices has a strong hash property, codes using sparse matrices can realize the achievable rate region. Furthermore...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملAnalysis of Source Code Repositories
Source code repositories are designed to store a huge amount of source code. They also collect indirectly information useful to analyze the development process. Usually, the last set of data is not used at all due to the lack of specialized tools to collect and analyze such data. This paper presents the early stages of a tool designed to perform acquisition and analysis of data stored in source...
متن کاملHash-Based Dynamic Source Routing (HB-DSR)
This paper presents and evaluates Hash-Based DSR, an extension of theDSR protocol. This protocol reduces the per-packet control overhead of DSR by compressing the source-route with a Bloom lter. Simulations on large networks show that HB DSR increases the network capacity by a factor of up to 15. HB DSR is an attractive alternative to DSR for large ad-hoc networks. Another important property of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Evidence and Electronic Signature Law Review
سال: 2014
ISSN: 2054-8508,1756-4611
DOI: 10.14296/deeslr.v6i0.1893