Hash

Results: 3740



#Item
891Information / Science / Information science / Computational linguistics / Knowledge representation / Peer-to-peer / Distributed hash table / Semantic similarity / Ontology / Semantic Web / Web services / Computing

C:/Documents and Settings/Giuseppe Pirrò/Desktop/CoreGrid-TR 0177 and Slide/CoreGrid TR 0177-Unical-UoM/ERGOT_tech.dvi

Add to Reading List

Source URL: coregrid.ercim.eu

Language: English - Date: 2008-09-24 04:19:42
892Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
893Chord / Model checking / Distributed computing / Routing / Distributed data storage / Computing / Distributed hash table

CrystalBall: Predicting and Preventing Inconsistencies in Deployed Distributed Systems Maysam Yabandeh, Nikola Kneˇzevi´c, Dejan Kosti´c and Viktor Kuncak School of Computer and Communication Sciences, EPFL, Switzerla

Add to Reading List

Source URL: lara.epfl.ch

Language: English - Date: 2009-03-03 06:54:09
894Key management / Diffie–Hellman key exchange / Ciphertext / Cryptographic hash function / Vigenère cipher / RSA / Key / Cryptanalysis / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

174 BLOWN TO BITS Lessons for the Internet Age Let’s pause for a moment to consider some of the lessons of cryptographic

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:42
895Hash / Omelette / Sausage / Eggs Benedict / Full breakfast / Diner lingo / Food and drink / Breakfast foods / Breakfast

2015 Breakfast Spring + Summer

Add to Reading List

Source URL: www.hardrockhotelchicago.com

Language: English - Date: 2015-05-21 15:06:24
896SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
897Computing / Data transmission / BitTorrent / Data mining / Peer-to-peer / Association rule learning / Network address translation / Communications protocol / Distributed hash table / File sharing networks / Data / Information

Computer Networks–863 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2009-07-03 23:35:37
898BitTorrent / Peer-to-peer / Computing / Cryptographic hash functions / Distribution / Hash function / Hash list / Mathematics / EigenTrust / File sharing networks / Error detection and correction / Mathematical analysis

Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems Yongkun Li John C.S. Lui The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 21:00:42
899Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
900Error detection and correction / Digital signature / RSA / ODB / Hash tree / Cryptography / Public-key cryptography / Key management

Authentication and Integrity in Outsourced Databases Einar Mykletun, Maithili Narasimha, Gene Tsudik Computer Science Department School of Information and Computer Science University of California, Irvine mykletun,mnaras

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:35
UPDATE