Hash list

Results: 236



#Item
51Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
52Hash table / Hash list / Information retrieval / Artificial intelligence / Information science / Cryptographic hash functions / Hashing / Error detection and correction

Overview of NFD Beichuan Zhang The University Of Arizona What is NFD

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:25
53Hash function / Hashcash / Hash list / Hash / Computing / Information / Error detection and correction / Hashing / Search algorithms

HASH HOUSE HARRIERS SINGAPORE FOUNDEDA MEN ONLY RUN) ______________________________________________________________________________________

Add to Reading List

Source URL: www.hhhs.org.sg

Language: English - Date: 2015-02-25 01:13:35
54Malware / Hash list / Software / Computing / Antivirus software / Freeware / VirusTotal.com

Analysis  of  Malware  Dataset   Brad  Miller   Outline   •  Context  &  Data  Overview   •  Infrastructure  

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-10-15 16:34:38
55Information science / Artificial intelligence / Hash table / Bloom filter / Hash function / Trie / Lookup table / Cryptographic hash function / Hash list / Hashing / Search algorithms / Information retrieval

Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing Haoyu Song Sarang Dharmapurikar Jonathan Turner John Lockwood l.e

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-22 10:41:44
56Perl / Data types / Search algorithms / Perl module / Hash function / Array data structure / Array data type / List / Objective-C / Software engineering / Computing / Computer programming

Perl versiondocumentation - perltie NAME perltie - how to hide an object class in a simple variable SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:14:32
57Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
58Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
59Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
60Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
UPDATE