Hash list

Results: 236



#Item
141Error detection and correction / HTTP clients / Hashing / Hash list / SHA-1 / Wget / CURL / Hash function / Metalink / Software / Computing / Cryptographic hash functions

Package ‘downloader’ July 2, 2014 Maintainer Winston Chang Author Winston Chang Version 0.3 License GPL-2

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:40:07
142Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
143Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
144Computer networking / Data synchronization / Search algorithms / Proxy server / Cache / Rsync / Cryptographic hash function / Hash list / Hash function / Computing / Hashing / Error detection and correction

Hierarchical Substring Caching for Efficient Content ∗ Distribution to Low-Bandwidth Clients Utku Irmak Torsten Suel

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 03:12:35
145Cryptography / Health informatics / Information science / Electronic health record / SHA-1 / Hash function / Information / Computing / Hash list / Cryptographic hash functions / Hashing / Error detection and correction

Test Procedure for §[removed]s Integrity APPROVED Version 1.0  August 13, 2010 Test Procedure for §[removed]s) Integrity This document describes the draft test procedure for evaluating conformance of complete EHRs or

Add to Reading List

Source URL: healthcare.nist.gov

Language: English - Date: 2010-08-13 13:13:32
146Computing / Hash function / SHA-2 / MD5 / Hash list / Computer programming / Information retrieval / Cryptographic hash functions / Hashing / Error detection and correction

The need for large-scale biometric testing

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-08-10 15:11:32
147Cryptographic hash functions / Bates numbering / Hashing / Computing / Hash function / Document / Electronic discovery / Hash list / Bates / Information / Error detection and correction / Data

Microsoft Word - HASH Aticle - converted to Word from FINAL UF Publication.Corrected.doc

Add to Reading List

Source URL: www.cctinstitute.com

Language: English - Date: 2009-10-06 11:18:52
148Computing / Computer programming / Cryptographic hash functions / Software engineering / Business intelligence / SAS / Hash function / Hash table / Hash list / Search algorithms / Error detection and correction / Hashing

PharmaSUG[removed]Paper CC13 Creating a Clinical Summary Table within a Single DATA Step with the Dynamic Trio: DOSUBL(), Hash Objects, and ODS Objects Joseph Hinson, Princeton, NJ ABSTRACT

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2013-05-05 15:33:41
149Computing / Abstract data types / Data types / Computer programming / Information retrieval / Hash function / Hash table / Hash list / Associative array / Search algorithms / Hashing / Error detection and correction

PharmaSUG[removed]Paper BB01 The Hash of Hashes as a "Russian Doll" Structure: Application to Clinical Adverse Events Data Analysis Joseph Hinson, Princeton, NJ ABSTRACT

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2013-05-05 15:16:27
150Computing / Hashing / MD5 / Suppression list / Search algorithms / Crypt / SHA-1 / SHA-2 / Hash function / Cryptographic hash functions / Cryptography / Email

Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2009-04-22 18:33:13
UPDATE