Hash

Results: 3740



#Item
941Concurrent computing / Chord / Distributed hash table / Peer-to-peer / Routing / Freenet / Anonymity / Overlay network / Distributed data storage / Computing / Software

Evaluating Sender and Recipient Anonymity in a Structured Overlay ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-10-03 10:37:24
942Philippe Flajolet / Counting / Hash function / Cardinal number / Cardinality / Multiset / Mathematics / Search algorithms / Combinatorics

LIPN NOV 2006 Comptage probabiliste : entre ´ mathematique

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2006-11-15 17:23:26
943Internet / Distributed hash table / Routing / Tree / Forwarding plane / Pastry / Chord / Distributed data storage / Network architecture / Computing

Practical Data-Centric Storage Cheng Tien Ee UC Berkeley Sylvia Ratnasamy Intel Research, Berkeley

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2006-03-21 12:49:23
944Hash / Breakfast / Biscuit / New Mexican cuisine / French toast / Food Paradise / Man v. Food Nation / Food and drink / Breakfast foods / Gravy

ROUTE 66 Brunch Route 66, The Mother Road and The Road Less Traveled are all names of the nostalgic highway that connected the Chicago to Santa Monica

Add to Reading List

Source URL: smythrestaurant.com

Language: English - Date: 2015-02-19 14:45:42
945Typography / Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Visual arts / Typeface / Lazy Dog / Communication design / Typesetting / Font family / HTML

Basic Font Attributes - Font Family Page 1 Basic Font Attributes - Font Family This test contains examples of basic character-level formatting - different font families.

Add to Reading List

Source URL: xep.xattic.com

Language: English - Date: 2004-10-22 12:25:26
946OverSim / Pastry / Kademlia / Distributed hash table / Koorde / Chord / Tapestry / Routing / Bootstrapping node / Distributed data storage / Computing / Computer architecture

Fast but economical: A simulative comparison of structured peer-to-peer systems Ingmar Baumgart and Bernhard Heep Institute of Telematics, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany Email: {baumgart,heep

Add to Reading List

Source URL: telematics.tm.kit.edu

Language: English - Date: 2012-06-29 09:27:30
947Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
948Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
949PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
950Computer network security / Device fingerprint / Internet fraud / Fingerprint / JavaScript / Google Chrome / HTTP cookie / Hash function / Public key fingerprint / Software / Computing / Internet privacy

PriVaricator: Deceiving Fingerprinters with Little White Lies Nick Nikiforakis, Wouter Joosen KU Leuven Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-02-28 20:20:56
UPDATE