First Page | Document Content | |
---|---|---|
![]() Date: 2014-08-22 14:11:37Keccak NIST hash function competition SHA-2 Preimage attack Merkle–Damgård construction Crypt Hash tree SHA-1 Secure Hash Standard Cryptographic hash functions Error detection and correction Cryptography | Add to Reading List |
![]() | Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,DocID: 1rqvV - View Document |
![]() | The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC BerkeleyDocID: 1r0TY - View Document |
![]() | Microsoft Word - article4.docDocID: 1qZW6 - View Document |
![]() | BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2DocID: 1qq4a - View Document |
![]() | 1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,DocID: 1qadb - View Document |