Hash

Results: 3740



#Item
241Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:27
242File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
243Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
244World cuisine / British cuisine / Cuisine of Northern Ireland / Fast food / Breakfast / Meals / Omelette / Scrambled eggs / Sausage / Hash / Pancake / Food Paradise

O r l e a n s B ru w e N y a

Add to Reading List

Source URL: www.poorhousebistro.com

Language: English - Date: 2016-05-31 22:14:18
245Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
246Computer storage devices / Cryptographic hash functions / Error detection and correction / Data management / Search algorithms / Search engine indexing / Crypt / Content-addressable storage / Backup / Data storage device / Data / SHA-1

libchop, a library for distributed storage & data backup

Add to Reading List

Source URL: www.nongnu.org

Language: English - Date: 2010-07-25 03:57:46
247Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
248Search algorithms / Hashing / Cuckoo hashing / Hash function / 2-choice hashing / Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for Unit 11 s 1. For this question assume we have n buckets, B1 , . . . , Bn , initially empty, and an unlimited

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-07 07:14:38
249Compiler optimizations / Search algorithms / Arrays / Global value numbering / Static single assignment form / Hash function / Hash table / Algorithm / Lookup table / Congruence

This talk is divided into 7 parts. Part 1 begins with a quick look at the SSA optimization framework and global value numbering. Part 2 describes a well known brute force algorithm for GVN. Part 3 modifies this to arriv

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2009-03-09 09:18:56
250Ministry of Foreign Affairs and Trade / Cullen / Steny Hoyer

Document: 08WELLINGTON15, CODEL HOYER MEETS WITH GNZ LEADERSHIP Release Date: Source: Lang: Hash (SHA256):

Add to Reading List

Source URL: www.seebenspend.com

Language: English - Date: 2012-10-31 15:55:55
UPDATE