Hash tree

Results: 206



#Item
141Mathematics / Search algorithms / Distributed hash table / File sharing / B-tree / Breadth-first search / Connectivity / Tree / Linked list / Distributed data storage / Graph theory / Computing

2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust Efficient Graph Models for Retrieving Top-k News Feeds from Ego Networks Rene Pic

Add to Reading List

Source URL: www.rene-pickhardt.de

Language: English - Date: 2012-09-04 08:53:38
142Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
143Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-15 11:47:32
144Computer programming / Chord / Trie / B-tree / Voldemort / Replication / Hash table / Rope / Computing / Distributed data storage / Data management

FAWN: A Fast Array of Wimpy Nodes David G. Andersen1 , Jason Franklin1 , Michael Kaminsky2 , Amar Phanishayee1 , Lawrence Tan1 , Vijay Vasudevan1 1 Carnegie Mellon University, 2 Intel Labs

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-05 10:48:33
145Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
146Cryptography / Search algorithms / Computing / Information retrieval / Hash tree / Hash list / Hash function / MD5 / Merkle–Damgård construction / Hashing / Cryptographic hash functions / Error detection and correction

Z:rentWorkding-paperding.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:26:36
147Binary tree / Hash function / Computing / Data management / Information science / Knowledge representation / Tree / B-tree

1 High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems Ramaswamy Ramaswamy and Tilman Wolf Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:39
148Search algorithms / Trie / Network flow / Radix tree / Forwarding plane / Hash table / OpenFlow / Flow network / Hash trie / Computing / Graph theory / Data

Efficient Conflict Detection in Flow-Based Virtualized Networks Sriram Natarajan∗, Xin Huang†, Tilman Wolf∗ ∗ University of Massachusetts, Amherst, MA 01002

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:31
149Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
UPDATE