Hash function

Results: 1800



#Item
591System software / Fuzz testing / Error detection and correction / Checksum / MD5 / Hash function / Sum / Adler-32 / Cksum / Software testing / Computing / Software

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang1,2 , Tao Wei1,2 , Guofei Gu3 , Wei Zou1,2∗ Laboratory of Network and Software Security Assurance (Peking Uni

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:46:44
592Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www2007.org

Language: English - Date: 2007-04-04 20:19:55
593Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
594Information retrieval / Search algorithms / Function / Algorithm / Recall / Hash function / Precision and recall / Mathematics / Science / Information science

Finding Near-Duplicate Web Pages: A Large-Scale Evaluation of Algorithms Monika Henzinger Google Inc. & Ecole Fed ´ erale ´

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2012-11-10 17:29:43
595Hash list / LOCKSS / Transmission Control Protocol / Localhost / Hash function / Computing / Network architecture / Information science / Error detection and correction / Cryptographic hash functions / Hashing

file:///tmp/voter-good.txt # Receive Poll message, create V3Voter to handle it 16:09:59.842: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::09:59.842: Debug3: 3-V3Voter: Creating V3 Voter for poll: H

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:42:30
596Cryptography / Hashing / Postage stamp / Linked timestamping / Computer security / Time / Cryptographic hash function

Protocols and data formats for time-stamping service 17th September 2002 Contents 1 Introduction

Add to Reading List

Source URL: www.timestamp.cyber.ee

Language: English - Date: 2003-01-29 09:32:12
597Unicode / Character sets / Typography / UTF-8 / Hash function / Private Use / Perl / Code point / Mapping of Unicode characters / Character encoding / Computing / Notation

Perl versiondocumentation - Unicode::UCD NAME Unicode::UCD - Unicode character database SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:20:34
598Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
599Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
600Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
UPDATE