Hash

Results: 3740



#Item
881Information / Distributed hash table / Peer-to-peer / Chord / Vanish / Communications protocol / Routing / Distributed data storage / Computing / Data

Adding Query Privacy to Robust DHTs Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:45:15
882Crime prevention / National security / Computer network security / Electronic commerce / Password / Phishing / Public-key cryptography / Kerberos / Cryptographic hash function / Cryptography / Security / Computer security

Contents Preface to the Second Edition xxv

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:34
883Hash / Biscuit / Open sandwich / Gravy / Sausage / Pancake / Eggs Benedict / Slinger / Food and drink / Breakfast foods / Breakfast

Classics Favorites Served with hash browns & your choice of biscuits or toast Two Egg Breakfast

Add to Reading List

Source URL: www.multnomahfallslodge.com

Language: English - Date: 2014-11-13 15:46:15
884Information science / Artificial intelligence / Error detection and correction / Hash function / Hash table / Trie / Search algorithms / Hashing / Information retrieval

A Probabilisti Dynami Te hnique for the Distributed Generation of Very Large State Spa es W.J. Knottenbelt a;1

Add to Reading List

Source URL: pubs.doc.ic.ac.uk

Language: English - Date: 2011-11-14 07:13:41
885Concurrent computing / File sharing networks / Network architecture / Peer-to-peer / Distributed hash table / ANts P2P / Chord / Overlay network / Connectivity / Computing / Distributed data storage / Software

Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2007-01-17 10:04:36
886Procedural programming languages / Search algorithms / C / Cross-platform software / Hash function / Hash table / ALGOL 68 / Binary tree / Pointer / Computing / Software engineering / Computer programming

Index-1 Index absorption law …………………………………………. abs …………………………………………………….. abstract ………………………………………………...

Add to Reading List

Source URL: www.bluepelicanjava.com

Language: English - Date: 2013-07-12 16:05:39
887Distributed computing / Internet protocols / File sharing networks / File sharing / Internet standards / Distributed hash table / Peer-to-peer / Pastry / PlanetLab / Computing / Concurrent computing / Distributed data storage

Distributed Session Announcement Agents for Real-Time Streaming Applications

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2009-01-26 21:52:49
888Parity of a permutation / Permutations / Model theory / Cryptographic hash functions / Homomorphic signatures for network coding / Mathematics / Group theory / Parity

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English
889Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
890Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
UPDATE