Hash

Results: 3740



#Item
521

Served 7:00 am - 10:30 am Pancakes $3.49 Served with your choice of bacon or sausage (add sliced bananas $1.00) Breakfast Burrito $5.29 Scrambled eggs, hash browns, cheese, salsa

Add to Reading List

Source URL: urbnmrkt.com

Language: English - Date: 2015-09-28 14:56:42
    522Concurrent computing / Computing / Distributed data storage / Computer programming / PlanetLab / Software testing / Distributed hash table / Distributed computing / Routing / Transmission Control Protocol / Distributed algorithms / Tapestry

    In Proceedings of 15th International World Wide Web Conference, Edinburgh, Scotland, May, WAP5: Black-box Performance Debugging for Wide-Area Systems

    Add to Reading List

    Source URL: piki.org

    Language: English - Date: 2007-05-31 12:01:24
    523

    Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin and Lei Wang EUROCRYPT 2014

    Add to Reading List

    Source URL: ec14.compute.dtu.dk

    Language: English - Date: 2014-05-16 06:27:32
      524

      Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi National Institute of Standards and Technology

      Add to Reading List

      Source URL: www.isical.ac.in

      Language: English - Date: 2011-12-28 03:46:39
        525Distributed data storage / File sharing / Peer-to-peer / Distributed hash table / Kademlia

        Noname manuscript No. (will be inserted by the editor) Asynchronous Privacy-preserving Iterative Computation on Peer-to-peer Networks J.A.M. Naranjo · L. G. Casado · Márk

        Add to Reading List

        Source URL: www.inf.u-szeged.hu

        Language: English - Date: 2012-08-28 04:30:12
        526

        Efficiency and Pseudo-Randomness of a Variant of Z´emor-Tillich Hash Function (Invited Paper) Christophe Petit Nicolas Veyrat-Charvillon

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:34
          527

          Hash Function Workshop Barcelona, May 24-25, 2007 Hash Function Workshop Promising new hash constructions?

          Add to Reading List

          Source URL: fse2007.uni.lu

          - Date: 2007-05-23 09:25:58
            528Cryptocurrencies / Bitcoin / Alternative currencies / Computing / E-commerce / Currency / Bitcoin network / Hashing / B-tree / Blockchain / Cryptographic hash function / Draft:Viccoin:APeer-to-PeerDigital Currency System

            Secure High-Rate Transaction Processing in Bitcoin Yonatan Sompolinsky1 and Aviv Zohar1,2 1 School of Engineering and Computer Science,

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-11 00:33:39
            529

            BREAKFAST MENU FRI, SAT & SUN: 7AM - 10AM Corned Beef Hash $9 2 poached eggs, hollandaise, toast

            Add to Reading List

            Source URL: www.seafoodshack.com

            Language: English - Date: 2015-09-09 11:49:24
              530

              Implementing a Verified On-Disk Hash Table Stephanie Wang Abstract As more and more software is written every day, so too are bugs. Software verification is a way of using formal

              Add to Reading List

              Source URL: css.csail.mit.edu

              Language: English - Date: 2015-06-14 19:45:36
                UPDATE