Hash

Results: 3740



#Item
261

ACFrOgCa76VdMRznN4TpGmGePiJdRDP5Gp_m7ro...&hash=dg59jmsdn6j069dbbdme6p6vcb43kqi9

Add to Reading List

Source URL: www.opa.org.uk

- Date: 2015-10-06 04:29:09
    262NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

    Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-09-08 06:00:03
    263Distributed data storage / File sharing / Distributed computing / Distributed hash table / Grid computing / Peer-to-peer / Computer cluster / Data grid / Wireless grid

    RW-OGS: An Optimized Random Walk Protocol for Resource Discovery in Large Scale Dynamic Grids

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2011-05-16 08:35:52
    264Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

    Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

    Add to Reading List

    Source URL: vialab.science.uoit.ca

    Language: English - Date: 2015-09-22 16:31:59
    265

    Página 1 de 1 Revisão 1.00 Relação de códigos de hash da NFS-e versão 2.03 Visando assegurar a autenticidade dos Documentos do Termo de Referência da NFS-e versão 2.03, publicado no portal da ABRASF (www.abrasf.o

    Add to Reading List

    Source URL: www.abrasf.org.br

    Language: Portuguese - Date: 2016-03-15 10:04:49
      266Search algorithms / Feature detection / Hashing / Error detection and correction / Bloom filter / Hash function / Sobel operator / Peak signal-to-noise ratio / Prewitt operator / Memristor / Hash table

      Resistive Bloom Filters: From Approximate Membership to Approximate Computing with Bounded Errors ∗ Department † Department

      Add to Reading List

      Source URL: mesl.ucsd.edu

      Language: English - Date: 2015-12-02 16:27:13
      267Pathfinder network / Psychometrics / Data / K-nearest neighbors algorithm / Tree / Networks / Self-organizing map / Distributed hash table

      Pathfinder 6.3 Pathfinder 6.3 Pathfinder 6.3 Pathfinder 6.3 Table of Contents

      Add to Reading List

      Source URL: interlinkinc.net

      Language: English
      268Distributed data storage / Pastry / Overlay / Component-based software engineering / Peer-to-peer / Middleware / Wireless ad hoc network / Scalability / OverSim / Distributed hash table

      A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation 1 Gareth Tyson, 1Paul Grace, 1Andreas Mauthe, 1Gordon Blair and 2

      Add to Reading List

      Source URL: www.eecs.qmul.ac.uk

      Language: English - Date: 2009-03-27 09:34:46
      269Distributed data storage / Email / Internet privacy / Public key infrastructure / Pastry / Simple Mail Transfer Protocol / Distributed hash table / Secure messaging / Short Message Service / Public-key cryptography / Cryptographic hash function

      POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

      Add to Reading List

      Source URL: www.cs.rice.edu

      Language: English - Date: 2003-04-12 02:53:53
      270File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

      Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

      Add to Reading List

      Source URL: zoo.cs.yale.edu

      Language: English - Date: 2013-11-08 11:13:55
      UPDATE