Hash function

Results: 1800



#Item
981Data types / Markup languages / Literal / Primitive data type / YAML / String interning / Java / String / Hash function / Computing / Software engineering / Computer programming

Luatex 0.70 short reference 1 Getting started

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2011-05-20 02:39:52
982Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions

Comments on NIST Draft Requirements and Criteria for Hash Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:56:14
983Cryptographic hash function / Two-factor authentication / Service-oriented architecture / Electronic signature / Digital signature / Password cracking / Skype security / Cryptography / Security / Password

Microsoft Word - IDEM eAuth Success Story ks edit.docx

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-07-31 19:42:26
984Software / SQLite / SQL / Database / Hash function / JavaScript / Unique key / Data management / Computing / Relational database management systems

Package ‘filehashSQLite’ July 2, 2014 Version[removed]Date[removed]Depends R (>= 2.14.0), methods, filehash (>= 1.0), DBI, RSQLite Imports filehash, DBI

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:51:36
985Multimedia Information Retrieval / Search algorithms / TRECVID / Hash function / Information science / Key frame / Video

UQMSG Experiments for TRECVID 2011 Heng Tao Shen, Jie Shao, Zi Huang, Yang Yang, Jingkuan Song, Jiajun Liu, Xiaofeng Zhu School of Information Technology and Electrical Engineering The University of Queensland, Australia

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2012-01-10 13:32:29
986Hashing / SHA-1 / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Search algorithms

X-Sieve: CMU Sieve 2.2 DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mimeversion:content-type; b=hpQBvkv1eVIC20ITx1GF9QzMkMgj4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:59:50
987Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:33
988Search algorithms / Hash function / Information retrieval / Artificial intelligence / Information science / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
989Search engine indexing / Inverted index / Hash function / Learning to rank / Tf*idf / Language model / Euclidean vector / N-gram / Index term / Information science / Information retrieval / Science

Inf Retrieval[removed]:747–768 DOI[removed]s10791[removed]Document vector representations for feature extraction in multi-stage document ranking Nima Asadi • Jimmy Lin

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2013-11-08 20:23:40
990Information / Database management systems / Search algorithms / Programming paradigms / Database theory / Bloom filter / Hash function / Bin / Stream processing / Computing / Hashing / Information science

Chapter 4 Mining Data Streams Most of the algorithms described in this book assume that we are mining a database. That is, all our data is available when and if we want it. In this chapter, we shall make another assumpt

Add to Reading List

Source URL: i.stanford.edu

Language: English - Date: 2014-11-09 17:51:05
UPDATE