Hash

Results: 3740



#Item
491Computing / File sharing / Concurrent computing / B-tree / Distributed data storage / Computer architecture / Peer-to-peer / Overlay network / BitTorrent / Node / Distributed hash table

Fair File Swarming with FOX Dave Levin Rob Sherwood Bobby Bhattacharjee Department of Computer Science, University of Maryland, College Park, MDEmails: {dml, capveg, bobby}@cs.umd.edu

Add to Reading List

Source URL: iptps06.cs.ucsb.edu

Language: English - Date: 2006-02-15 01:41:07
492Computing / Network architecture / Internet / Internet Standards / Routing / Computer networking / Arrays / IP addresses / Lookup table / Hash table / IPv6 / Trie

Towards a Billion Routing Lookups per Second in Software Marko Zec Luigi Rizzo Miljenko Mikuc

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2012-06-02 04:57:32
493

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions J. Black ∗ M. Cochran ∗

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:07:47
    494

    Breakfast Big BreakfastStreaky bacon, poached eggs, hash browns, sausages,

    Add to Reading List

    Source URL: www.captains.co.nz

    Language: English - Date: 2016-01-03 13:54:10
      495

      Preimages for the Tillich-Z´ emor hash function Christophe Petit1? , Jean-Jacques Quisquater1 UCL Crypto Group?? Universit´e catholique de Louvain Place du levant 3

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:35
        496

        Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Ahto Buldas1,2,3,⋆ and Sven Laur4,⋆⋆ 1 Cybernetica, Akadeemia tee 21, 12618 Tallinn, Estonia.

        Add to Reading List

        Source URL: lepo.it.da.ut.ee

        Language: English - Date: 2006-03-20 09:54:54
          497Distributed data storage / Distributed hash table / Pastry / Kademlia / Tapestry / Chord / Peer-to-peer / Routing / Tulip Overlay / Koorde

          Appears in Proceedings of the USENIX Annual Technical Conference, JuneHandling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz University of California, Berkeley and Intel Research, B

          Add to Reading List

          Source URL: www.oceanstore.org

          Language: English - Date: 2004-05-05 14:04:24
          498

          Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Group Daniel J. Bernstein, University of Illinois at Chicago Martin Boßlet, freelancer

          Add to Reading List

          Source URL: www.131002.net

          Language: English - Date: 2012-11-08 11:18:52
            499Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games

            On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

            Add to Reading List

            Source URL: digitalpiglet.org

            Language: English - Date: 2009-11-27 08:30:51
            500

            Dynamic Load Balancing in Distributed Hash Tables Marcin Bienkowski† Miroslaw Korzeniowski Abstract

            Add to Reading List

            Source URL: iptps05.cs.cornell.edu

            Language: English - Date: 2005-01-27 12:02:40
              UPDATE