Hashing

Results: 1317



#Item
741Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2007-11-04 03:24:11
742Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2007-08-26 21:30:00
743Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.organicdesign.co.nz

Language: English - Date: 2011-06-18 04:34:18
744Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
745Mathematics / Search algorithms / Multiset / Hash function / Collision resistance / MD5 / SHA-1 / Collision / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
746Cryptography / Data management / Cryptographic hash functions / Error detection and correction / Checksum / Hash list / Inode / File system / Hash function / Computing / Disk file systems / Hashing

Enhancing File System Integrity Through Checksums Gopalan Sivathanu, Charles P. Wright, and Erez Zadok Stony Brook University Technical Report FSL-04-04

Add to Reading List

Source URL: www.fsl.cs.sunysb.edu

Language: English - Date: 2012-09-07 11:07:01
747Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
748Information retrieval / Hash function / Hash table / Locality-sensitive hashing / Image retrieval / Tf*idf / Cryptographic hash function / Histogram / Query expansion / Information science / Search algorithms / Artificial intelligence

Near Duplicate Image Detection: min-Hash and tf-idf Weighting Ondˇrej Chum1 1 CMP, James Philbin2

Add to Reading List

Source URL: www.robots.ox.ac.uk

Language: English - Date: 2008-07-25 10:15:10
749Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
750Information retrieval / Artificial intelligence / Hash table / Linear hashing / Hash function / Extendible hashing / Trie / Bucket sort / Cryptographic hash function / Hashing / Search algorithms / Information science

Split-Ordered Lists: Lock-Free Extensible Hash Tables ORI SHALEV Tel-Aviv University, Tel-Aviv, Israel AND NIR SHAVIT

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2007-02-14 07:20:54
UPDATE