Hash

Results: 3740



#Item
681

Seeing Singapore on the Run Memories of the Singapore Hash House Harriets By Andra Leo If you ever find yourself strolling somewhere on a peaceful Wednesday evening and suddenly hear the strange cry of “On! On!” from

Add to Reading List

Source URL: www.fom.sg

Language: English - Date: 2015-01-12 01:12:59
    682Key management / PAdES / XAdES / CAdES / Digital signature / European Telecommunications Standards Institute / Electronic signature / Cryptographic hash function / Public key certificate / Cryptography / Cryptography standards / Public-key cryptography

    TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

    Add to Reading List

    Source URL: www.etsi.org

    Language: English - Date: 2015-05-12 09:17:43
    683Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

    Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

    Add to Reading List

    Source URL: www.tutus.se

    Language: English - Date: 2015-07-12 19:16:51
    684Software engineering / Distributed hash table / Kademlia / Peer-to-peer / Hash table / Prefix hash tree / Trie / Hash list / Hash function / Distributed data storage / Computing / Computer programming

    Microsoft Word - SIGIR06-soro-lai-final.doc

    Add to Reading List

    Source URL: www.geo.unizh.ch

    Language: English - Date: 2006-07-06 07:27:00
    685Computer architecture / Kademlia / Distributed hash table / OverSim / Pastry / Chord / Routing / Peer-to-peer / Key-based routing / Distributed data storage / Computing / Network architecture

    S/Kademlia: A Practicable Approach Towards Secure Key-Based Routing Ingmar Baumgart and Sebastian Mies Institute of Telematics Universit¨at Karlsruhe (TH) D–76128 Karlsruhe, Germany Email: {baumgart, mies}@tm.uka.de

    Add to Reading List

    Source URL: doc.tm.uka.de

    Language: English - Date: 2007-12-18 08:28:18
    686Hash / Human behavior / Calen /  Queensland / Cryptographic hash functions / Hash list

    WHEN: WHERE: Turn west at Calen (half way between Mackay & Proserpine) and 12km to the Wintermoon Camp Site.

    Add to Reading List

    Source URL: www.hhh.asn.au

    Language: English - Date: 2015-06-02 06:19:43
    687Internet / Information retrieval / URL redirection / HTTP / Hash table / HTTP cookie / Redirection / Computing / Uniform resource locator / Information science

    Poster:An Efficient and Scalable Cyberlocker Traffic Tracking Method Chao Zheng1,2,3), Peng Zhang1,2), Shu Li1,2) , Jianlong Tan1,2),Qingyun Liu1,2,3) 1 Institute of Information Engineering, Chinese Academy of Sciences,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:20
    688Distributed data storage / File sharing networks / File sharing / Distributed computing architecture / Overlay network / Peer-to-peer / 6bone / Mbone / Distributed hash table / Computing / Concurrent computing / Network architecture

    Peer-to-peer networks and Distributed Hash Tables George Porter CSE 124 Mar 10, 2015

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2015-03-10 13:05:48
    689Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

    CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-01 19:29:53
    690Information retrieval / Locality-sensitive hashing / Hash function / Hash table / Piotr Indyk / Search algorithms / Artificial intelligence / Information science

    Beyond Locality-Sensitive Hashing Alexandr Andoni (Microsoft Research), Piotr Indyk (MIT), Huy L. Nguyen (Princeton) and Ilya Razenshteyn (MIT) (Approximate) Near Neighbor Problem ((A)NN) The main approach: data-depende

    Add to Reading List

    Source URL: www.ilyaraz.org

    Language: English - Date: 2014-04-21 21:52:06
    UPDATE