Hash tree

Results: 206



#Item
71Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {imiers, cgarman, mgreen, rubin}@

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-05-20 18:39:31
72Distributed hash table / Pastry / Tapestry / Peer-to-peer / Gossip protocol / Gnutella / AVL tree / Replication / Trie / Distributed data storage / Computing / Chord

Kelips∗: Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, Robbert van Renesse Cornell University, Ithaca, NY, USA {gupta, k

Add to Reading List

Source URL: iptps03.cs.berkeley.edu

Language: English - Date: 2003-02-10 13:10:45
73Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {imiers, cgarman, mgreen, rubin}@

Add to Reading List

Source URL: isi.jhu.edu

Language: English - Date: 2013-04-11 16:49:44
74Chord / Distributed hash table / Internet / Peer-to-peer / Sybil attack / Routing table / Routing / Tree / Kademlia / Distributed data storage / Computing / Network architecture

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009

Add to Reading List

Source URL: dspace.mit.edu

Language: English - Date: 2009-09-29 02:01:46
75Applied mathematics / Hashing / Suffix tree / Hash function / Hash table / Vertex cover / Bloom filter / Universal hashing / Time complexity / Theoretical computer science / Search algorithms / Computational complexity theory

Guide to Examinable Material COMS31900 – Advanced AlgorithmsDecember 2013 Overview This guide is organised topic by topic in the same order that the course was taught. References into the lectures are giv

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:17
76Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

2013 IEEE Symposium on Security and Privacy Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Bal

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:42
77Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
78Distributed hash table / Chord / Peer-to-peer / Hash table / Prefix hash tree / Lookup table / PlanetLab / Trie / Kademlia / Distributed data storage / Computing / Computer programming

OpenDHT: A Public DHT Service and Its Uses Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-20 07:39:06
79Computer programming / Information retrieval / Hash table / Hash function / Cryptographic hash function / Lookup table / Van Emde Boas tree / Associative array / Universal hashing / Hashing / Search algorithms / Computing

Advanced Algorithms – COMS31900Lecture 2 Hash tables Markus Jalsenius

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
80Computing / Cryptography / Computer programming / B-tree / Search algorithms / Hash function / Bloom filter / MD5 / Binary tree / Hashing / Cryptographic hash functions / Error detection and correction

FastAD: An Authenticated Directory for Billions of Objects Paul T. Stanton, Benjamin McKeown, Randal Burns, Giuseppe Ateniese Department of Computer Science, Johns Hopkins University ABSTRACT We develop techniques that m

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-09-28 22:39:23
UPDATE