First Page | Document Content | |
---|---|---|
![]() Date: 2013-09-26 15:45:01Cryptography NIST hash function competition Keccak SHA-2 SHA-1 Crypt Hash function HMAC Hash tree Cryptographic hash functions Error detection and correction Hashing | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 2,23 MBShare Document on Facebook |
![]() | Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,DocID: 1rqvV - View Document |
![]() | The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC BerkeleyDocID: 1r0TY - View Document |
![]() | Microsoft Word - article4.docDocID: 1qZW6 - View Document |
![]() | BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2DocID: 1qq4a - View Document |
![]() | 1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,DocID: 1qadb - View Document |