Hashing

Results: 1317



#Item
481Cryptographic hash function / Information retrieval / Information science / Artificial intelligence / Hash / Hash functions / Hash table / Bloom filter / Hashing / Search algorithms / Error detection and correction

Perl versiondocumentation - Hash::Util NAME Hash::Util - A selection of general-utility hash subroutines SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:56:23
482Hashing / Relational model / Query languages / Database theory / Relational database / Rsync / Hash function / Cksum / Checksum / Computing / Data management / Software

Remote Comparison of Database Tables Technical Report A/375/CRI Fabien Coelho ´ Centre de Recherche en Informatique, Ecole

Add to Reading List

Source URL: cri.ensmp.fr

Language: English - Date: 2006-02-06 04:59:56
483Information retrieval / Searching / Web crawlers / World Wide Web / Consistent hashing / Robots exclusion standard / Hash function / Hash table / Cryptographic hash function / Hashing / Information science / Search algorithms

UbiCrawler: A Scalable Fully Distributed Web Crawler Paolo Boldi∗ Bruno Codenotti† Massimo Santini‡

Add to Reading List

Source URL: vigna.di.unimi.it

Language: English - Date: 2003-10-19 11:16:51
484Cryptography / Hash function / Cryptographic hash function / Hash chain / Artificial intelligence / Cyberwarfare / Applied mathematics / Hashing / Search algorithms / Error detection and correction

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs John Kelsey and Bruce Schneier Counterpane Internet Security, Inc. 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
485Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
486Hashing / Hash function / Digital signature / MD5 / Lamport signature / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
487Hashing / Stream processing / Cluster analysis / Filter / Data stream clustering / Electronic filter / Stream / BIRCH / Statistics / Computing / Bloom filter

Microsoft PowerPoint - Csernel - 3way Summary vo.ppt

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2007-05-11 05:33:20
488Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
489MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-08 12:38:58
490Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
UPDATE