Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hash Function

Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
A one-way function that transforms a variable-length bit-string into a fixed-length bit-string.
Published in Chapter:
Commercial Home Assistance Services
Milica Milutinovic (K.U.Leuven, Belgium), Koen Decroix (Katholieke Hogeschool Sint – Lieven, Belgium), Vincent Naessens (Katholieke Hogeschool Sint – Lieven, Belgium), and Bart De Decker (K.U.Leuven, Belgium)
DOI: 10.4018/978-1-4666-3990-4.ch008
Abstract
In this chapter, the authors describe the software architecture of a commercially run home assistance system that allows patients or elderly people to stay longer at home. Since such systems often have to handle sensitive medical information, the protection of the privacy is a major concern. In addition, legislation often restricts access to health information to qualified persons (i.e. medical personnel), who are not always available in a commercial setting. The home assistance system can offer several services, ranging from scheduling necessary tasks and following up their execution, to monitoring the patient’s health status and responding promptly to requests for help or in case of emergency situations, and all this without the need to maintain personal medical data or identifying information about patients and caregivers in the home assistance centre.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Commercial Home Assistance Services
A one-way function that transforms a variable-length bit-string into a fixed-length bit-string.
Full Text Chapter Download: US $37.50 Add to Cart
A Brief Analysis of Blockchain Algorithms and Its Challenges
It takes a set of digital data and delivers a numeric piece of data with a fixed range. If you deliver a same exact data to a hash function, it will deliver the same exact numeric piece of data every time. If the data input varies even by one variable, the hash function output will change.
Full Text Chapter Download: US $37.50 Add to Cart
On the Stability of Peer-to-Peer Networks in Real-World Environments
A mathematical formula, which is used to turn some data into a representing number, which can serve as a digital fingerprint. These formula can usually be applied to any data and create a seemingly random but reproducible identifier. Example algorithms for this are MD5 and SHA-1.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Cross-Industry Use of Blockchain Technology and Opportunities for the Future: Blockchain Technology and Aritificial Intelligence
A cryptographic hash function allows one to easily verify that some input data maps to a given value. This is used for assuring integrity of transmitted data and is the building block for providing message authentication. Hash functions are related to (and often confused with) check digits, fingerprints, and other verification tools.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Cloud Computing
A one way function which produces a fixed data output. It is used to confirms the message integrity at receiver side.
Full Text Chapter Download: US $37.50 Add to Cart
SecBrain: A Framework to Detect Cyberattacks Revealing Sensitive Data in Brain-Computer Interfaces
It is a mathematical function that converts a given input into a compressed output; the generated value is unique for the same data.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis and Comparison of Hash Functions in Terms of Security and Performance
It is a mathematical function that can convert any digital data into an output string with a fixed number of characters.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Applications in Lifelong Learning and the Role of the Semantic Blockchain
A mathematical function which, regardless of the size of its input, always gives a fixed size output, with the property that a particular output (a hash) can only be generated by exactly one input, and which is one-way. That is, there is no way to compute the input given only the output.
Full Text Chapter Download: US $37.50 Add to Cart
Robust User Authentication Scheme for IoT-Based Healthcare Applications
The proposed scheme uses the lightweight cryptographic hash function and is defined as: “h: {0, 1}* ? {0, 1} l , where l is the output length of h(·)”.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Networks, Authentication, Privacy, and Security Models
Hash function is a function that takes a long string (or “message”) of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.
Full Text Chapter Download: US $37.50 Add to Cart
System-on-Chip Design of the Whirlpool Hash Function
Hash function is a function that maps an input of arbitrary length into a fixed number of output bits, the hash value.
Full Text Chapter Download: US $37.50 Add to Cart
Lightweight Cryptography for Cyber-Physical Systems: State of the Art
Is a mathematical function that takes an input of any size and produces an output of a fixed size. Hash functions are often used to verify the integrity of data.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Adoption: Guidelines and Mexican Case Review
Is the process of taking an input string of data, of any lenght, and transforming it into a fixed length.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR