Hash

Results: 3740



#Item
351Distributed data storage / File sharing networks / File sharing / Chord / Gnutella / Trie / B-tree / Reserved word / T-tree / Peer-to-peer / Distributed hash table / Kademlia

KISS: A Simple Prefix Search Scheme in P2P Networks∗ Yuh-Jzer Joung Li-Wei Yang

Add to Reading List

Source URL: db.ucsd.edu

Language: English - Date: 2007-05-03 17:08:43
352Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
353File sharing / Peer-to-peer / Distributed data storage / International Conference on Parallel and Distributed Systems / Social peer-to-peer processes / Distributed hash table / Semantic P2P networks

Call for Papers The 3rd International Workshop on Peer-to-Peer Networked Virtual Environments in conjunction with The 15th International Conference on Parallel and Distributed Systems (ICPADS 2009)

Add to Reading List

Source URL: acnlab.csie.ncu.edu.tw

Language: English - Date: 2011-01-11 22:08:22
354Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
355Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
356Distributed data storage / Distributed hash table / Tapestry / Kademlia / Pastry / Chord / Peer-to-peer / Routing / Link-state routing protocol / PlanetLab / Tree / Koorde

Non-Transitive Connectivity and DHTs Michael J. Freedman, Karthik Lakshminarayanan, Sean Rhea, and Ion Stoica New York University and University of California, Berkeley , {karthik,srhea,istoica}@cs.berke

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2007-08-08 12:40:34
357File sharing / BitTorrent / Cryptographic hash functions / Error detection and correction / Distributed hash table / Peer-to-peer / Gnutella / Hash list / Comparison of file sharing applications / Merkle tree

The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:29
358Error detection and correction / Hash function / Ur / Backup Exec / Backup / Foreach loop

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYSpringQuiz I Solutions

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
359Distributed data storage / Tapestry / Pastry / Chord / Routing / Bootstrapping node / Overlay network / Peer-to-peer / Content addressable network / Distributed hash table

Secure routing for structured peer-to-peer overlay networks Miguel Castro1 , Peter Druschel2 , Ayalvadi Ganesh1 , Antony Rowstron1 and Dan S. Wallach2 1 Microsoft 2 Rice Research Ltd., 7 J J Thomson Avenue, Cambridge, C

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-10-11 20:14:20
360Distributed data storage / Routing / Distributed hash table / Skip graph / Pastry / Chord / Kademlia / Computer network / Skip list / Topology / Tapestry / BATON Overlay

FRT-Skip Graph: A Skip Graph-Style Structured Overlay based on Flexible Routing Tables Masashi Hojo†∗ , Ryohei Banno‡† and Kazuyuki Shudo† † Tokyo

Add to Reading List

Source URL: www.shudo.net

Language: English - Date: 2016-06-28 10:59:11
UPDATE