Hash

Results: 3740



#Item
341Search algorithms / Hashing / Hash table / Hash function / Cryptographic hash function / Bin / Trie / Bloom filter / Locality-sensitive hashing

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-06-07 05:36:19
342Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
343Cryptography / Cryptographic software / ISO standards / Hardware security module / Smart card / BitLocker / USB / Key / Secure Hash Algorithm / NSA Suite B Cryptography / Elliptic curve cryptography / Rosetta

PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:26:38
344Computer access control / Password / Security / Login / Form / Password manager / Pass the hash

Aquaexcel repository - BioWes Installation 1. Connect to Aquaexcel server - http:/// (put it to your browser) 2. Click to Registration a. Type your email, first name, last name and create password b. Your

Add to Reading List

Source URL: www.aquaexcel.eu

Language: English - Date: 2015-04-01 10:37:04
345Error detection and correction / Hash function

5th round, January 16th , 2016 COCITASK

Add to Reading List

Source URL: hsin.hr

Language: English - Date: 2016-01-18 03:30:00
346Search algorithms / Hashing / Hash function / Hash table / Cuckoo hashing / Cryptographic hash function / Birthday problem / Feature hashing / Tabulation hashing

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
347Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-12-17 12:10:14
348

Página 1 de 1 Revisão 1.00 Relação de códigos de hash da NFS-e versão 2.02 Visando assegurar a autenticidade dos Documentos do Termo de Referência da NFS-e versão 2.02, publicado no portal da ABRASF (www.abrasf.o

Add to Reading List

Source URL: www.abrasf.org.br

Language: Portuguese - Date: 2014-08-22 12:27:42
    349Distributed data storage / Pastry / Distributed hash table / Tree / Binary tree / Node / Tapestry / IP multicast / Multicast / R-tree / Anycast / Routing

    bottleneck_bandwidth_downstream_upstream_cdf1.xls

    Add to Reading List

    Source URL: www.cs.rice.edu

    Language: English - Date: 2003-08-13 11:44:30
    350Hashing / Search algorithms / Bloom filter / Countmin sketch / Hash table / Hash function / Set / Universal hashing / Filter / RabinKarp algorithm / Feature hashing

    CS168: The Modern Algorithmic Toolbox Lecture #2: Approximate Heavy Hitters and the Count-Min Sketch Tim Roughgarden & Gregory Valiant∗ March 30, 2016

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2016-06-04 09:49:43
    UPDATE