Hash

Results: 3740



#Item
161Distributed data storage / Computing / Network architecture / Tapestry / Chord / Distributed hash table / Pastry / Kademlia / Routing / Peer-to-peer

Microsoft PowerPoint - iscc2014_figs.pptx

Add to Reading List

Source URL: www.shudo.net

Language: English
162Distributed data storage / Computing / BitTorrent / Concurrent computing / Distributed computing / File sharing / Distributed hash table / Computer networking / Kademlia / Vuze / Chord / Pastry

IET Information Security Research Article Hijacking the Vuze BitTorrent network: all your hop are belong to us

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:38
163Food and drink / Cuisine of the Southern United States / Food combinations / Meals / British cuisine / Breakfast / Fried egg / Omelette / Scrambled eggs / Grits / Hash / Biscuits and gravy

OMELETS All our four egg omelets are served with stone ground grits or hash browns and toast or biscuits. There is a charge of $0.99 for each additional topping. BREAKFAST MENU

Add to Reading List

Source URL: media.pearlriverresort.com

Language: English - Date: 2016-08-01 08:19:15
164Computing / Network architecture / Computer architecture / Internet Protocol / File sharing / Distributed computing architecture / Distributed data storage / Overlay network / Mobile IP / Distributed hash table / IPv6 / Node

File: Title: Authors: Date:

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2005-01-30 17:39:30
165Cryptography / Cryptographic hash functions / Information theory / Secure multi-party computation / Transmission Control Protocol / Bandwidth / SHA-1 / Internet protocol suite / Computational complexity theory / Network performance

Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2011-09-10 05:30:51
166Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
167Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
168Computing / File sharing / Concurrent computing / BitTorrent / Distributed computing / Distributed data storage / Network architecture / Middleware / Peer-to-peer / Distributed hash table / Clientserver model

1 Juno: An Adaptive Delivery-Centric Middleware Gareth Tyson1 , Andreas Mauthe2 , Sebastian Kaune3 , Paul Grace2 , Thomas Plagemann4 1 Department of Informatics, King’s College London, UK 2 Computing Department, Lanca

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2012-05-30 06:42:20
169Distributed data storage / Computing / Computer programming / Concurrent computing / Kademlia / Distributed hash table / Chord / Pastry / Kad network / Trie / Hash table / Peer-to-peer

Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
170Hashing / Information retrieval / Information science / Search algorithms / Hash table / Hash function / Quadratic probing / Cryptographic hash function / Linear probing / Trie / Double hashing / Hash list

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-08 02:53:29
UPDATE