Hash list

Results: 236



#Item
211Hash function / Hash list / Hash / Computing / Information / Error detection and correction / Hashing / Search algorithms

HASH HOUSE HARRIERS SINGAPORE FOUNDED[removed]A MEN ONLY RUN) ______________________________________________________________________________________

Add to Reading List

Source URL: www.hhhs.org.sg

Language: English - Date: 2014-03-12 23:38:44
212Information science / Information retrieval / Cryptographic hash functions / Information / Hash function / Record linkage / Health informatics / National Institute of Environmental Health Sciences / Hash list / Hashing / Error detection and correction / Search algorithms

Anonymous Record Linkage Between EPR and CDW-H: Toward Development of a Federated Genotype-Phenotype System Dongqiuye Pu, M.S.1,2, Stavros Garantziotis, M.D.3, Javed Mostafa, Ph.D.1,2

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
213Computing / Error detection and correction / Search algorithms / Hash function / SHA-2 / Hash list / Hash table / Crypt / Rsync / Cryptographic hash functions / Cryptography / Hashing

digital investigation 3S[removed]S91–S97 available at www.sciencedirect.com

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:24
214Skip graph / Skip list / Distributed hash table / Chord / B+ tree / Tree / Trie / Koorde / Tango tree / Graph theory / Distributed data storage / B-tree

doi:[removed]j.comcom[removed]

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2010-05-14 09:06:57
215BitTorrent / Cryptographic hash functions / Error detection and correction / Concurrent computing / Peer-to-peer / Software / Peer exchange / Hash list / Bitcoin / Hashing / File sharing networks / Computing

Timekoin Server Technical White Paper Introduction. This Technical White Paper will step through each part of the Timekoin Crypto-Currency System with detailed

Add to Reading List

Source URL: timekoin.com

Language: English - Date: 2013-03-14 00:13:01
216Distributed data storage / Computing / Computer programming / Cryptography / Data / Hash tree / Hash list / Binary tree / Trie / Hashing / Cryptographic hash functions / Error detection and correction

SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks 1

Add to Reading List

Source URL: www.syssec.ethz.ch

Language: English - Date: 2006-09-14 08:13:37
217Peer-to-peer / Luby transform code / Backup / Information / Remote backup service / Erasure code / Reed–Solomon error correction / Hash list / File system / Coding theory / Error detection and correction / Computing

iDIBS: An Improved Distributed Backup System Faruck Morcos1 , Thidapat Chantem1 , Philip Little1, Tiago Gasiba2 , and Douglas Thain1 1

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2006-04-26 16:46:48
218Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
219Lisp programming language / Data types / Functional languages / Abstract data types / Arrays / VList / Linked list / Pointer / List / Computing / Software engineering / Computer programming

Fast Functional Lists, Hash-Lists, Deques and Variable Length Arrays Phil Bagwell

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:31:58
220Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
UPDATE