Hash list

Results: 236



#Item
101CTC / Program management / Computing / Cryptographic hash functions / SHA-1 / SHA-2

CTC Financial Vote List 2.5 Highway Financial Matters January 22, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-01-08 18:43:06
102Error detection and correction / SHA-1 / Hash list / Hash function / Crypt / Digital signature / SHA / Magnet URI scheme / File verification / Cryptography / Cryptographic hash functions / Hashing

LandXML LandXML – Signing & Sealing by Warren G. Clary, PE

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:03
103Computing / Search algorithms / Information / Data / Hash tree / Hash function / Hash list / Trie / Database index / Error detection and correction / Hashing / Cryptographic hash functions

TRUSTED ARCHIVE OVERVIEW ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-12-23 13:21:52
104SHA-1 / Computing / Cryptographic hash functions / CTC / SHA-2

CTC Financial Vote List 2.5 December 10, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-11-26 12:05:35
105Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
106Information retrieval / Artificial intelligence / Hash table / Cuckoo hashing / Hash function / Queue / Pointer / Linked list / Tabulation hashing / Search algorithms / Hashing / Information science

External-Memory Multimaps Elaine Angelino ∗ SEAS, Harvard University [removed] arXiv:1104.5533v2 [cs.DS] 16 Sep 2011

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2014-03-30 22:03:56
107Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
108Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-08-21 16:39:46
109Hash list / SHA-1 / Firmware / Crypt / Computer programming / Mathematics / Cryptographic hash functions / Computing / SHA-2

Andrea Gyger From: Sent: To: Cc: Subject:

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-11-01 02:14:41
110Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
UPDATE