Hash function

Results: 1800



#Item
911Software / Search algorithms / Web 2.0 / Real-time web / Error detection and correction / Hash function / Facebook / Twitter / World Wide Web / Social media / Computing

Microsoft Word - smug20120920Minutes.rtf

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2014-11-13 16:27:20
912Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cryptographic hash functions / Metrology / NIST hash function competition / Metre / Uncertainty / Text Retrieval Conference / Measurement / Science / Knowledge

Information Technology Laboratory Newsletter INSIDE THIS ISSUE November—December 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-29 16:09:26
913Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
914Data / Information / Data integrity / Data quality / Transaction processing / Token coin / Access token / Database / Hash function / Data management / Computer security / Database management systems

DigCCurr2009Proceedings_CH0319noon.pdf

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2010-02-22 21:01:54
915Museology / Error detection and correction / Archival science / Library science / Cryptographic hash function / Information science / Hash function / Digital preservation / Hashing / Cryptography / Data quality

ACE: a Novel Software Platform to Ensure the Long Term Integrity of Digital Archives Sangchul Song, Joseph JaJa; Institute for Advanced Computer Studies, Department of Electrical and Computer Engineering, University of M

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2008-09-10 16:10:09
916Cyberwarfare / Trusted Computing / Cryptographic protocol / Operating system / Cryptographic hash function / Cryptography / Security / Computer security

Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-08-07 18:17:41
917JH / NIST hash function competition / CSB

GENERAL ACCOUNTING OFFICE

Add to Reading List

Source URL: gao.az.gov

Language: English - Date: 2014-10-30 13:32:59
918Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
919Data management / Knowledge representation / Metadata / Authenticator / Hash function / UTF-8 / Information / Technical communication / Data

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:09:55
920Email authentication / Internet privacy / Key management / Kerberos / Message authentication code / Password / S/MIME / Digital signature / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Young, A., Kirstein, P. and Ibbetson, A[removed]Technologies to Support Authentication in Higher Education : A Study for the UK Joint Information Systems Committee, August 21th, 1996. Other. UKOLN, University of Bath, Ba

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2014-12-16 19:39:40
UPDATE