Hash table

Results: 1003



#Item
371Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
372Hash function / Search algorithms / Hash table / Xeon

PDF Document

Add to Reading List

Source URL: www.efficios.com

Language: English - Date: 2013-11-07 11:14:57
373OverSim / Network architecture / Distributed hash table / Routing / Pastry / Computer architecture / Chord / Distributed data storage / Computing / Peer-to-peer

PDF Document

Add to Reading List

Source URL: telematics.tm.kit.edu

Language: English - Date: 2012-06-29 09:28:11
374Technology / Wireless sensor network / Sensor node / Electronics / Kademlia / Distributed hash table / Distributed data storage / Computing / Wireless networking

Data Centric Storage with Diffuse Caching in Sensor Networks Keng-Teck Ma, King-Shan Lui, Vincent Tam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong, China

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2012-06-13 00:42:15
375Electromagnetism / Computer network / Telecommunications engineering / Node / Distributed computing / Routing / Topology / Network topology / Distributed hash table / Distributed data storage / Electronics / Computing

A Position Statement: An Approach to Measuring Large-Scale Distributed Systems Jun Li, Peter Reiher, Gerald Popek {lijun, reiher, popek}@cs.ucla.edu University of California, Los Angeles

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-02-16 03:43:51
376Distributed computing / Tapestry / Chord / Distributed hash table / Pastry / Kademlia / Overlay network / Peer-to-peer / ANts P2P / Distributed data storage / Computing / Concurrent computing

One Ring to Rule Them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks Miguel Castro Microsoft Research – Cambridge Peter Druschel

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:20
377Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
378Cyberwarfare / Rainbow table / Password / SHA-2 / Crypt / Password strength / LM hash / Cryptography / Cryptographic hash functions / Computer security

CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
379Distributed computing / Chord / Distributed hash table / Peer-to-peer / Routing / Kademlia / BATON Overlay / Distributed data storage / Concurrent computing / Computing

A Peer-to-Peer Dictionary Using Chord DHT Siamak Sarmady School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia {}

Add to Reading List

Source URL: www.sarmady.com

Language: English - Date: 2007-12-13 20:16:39
380Peer-to-peer / Computing / Extensible Storage Engine / Lock / Data management / Distributed data storage / Distributed hash table / File sharing

Brief Announcement: Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs Benjie Chen, Thomer M. Gil, Athicha Muthitacharoen, and Robert Morris {benjie,thomer,athicha,rtm}@lcs.mit.edu MIT L

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2004-08-18 17:00:07
UPDATE