Hashing

Results: 1317



#Item
771Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
772Information retrieval / Artificial intelligence / Hash table / Cuckoo hashing / Hash function / Queue / Pointer / Linked list / Tabulation hashing / Search algorithms / Hashing / Information science

External-Memory Multimaps Elaine Angelino ∗ SEAS, Harvard University [removed] arXiv:1104.5533v2 [cs.DS] 16 Sep 2011

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2014-03-30 22:03:56
773Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
774Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
775Error detection and correction / Hashing / Cryptographic hash functions / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Spaceflight

Microsoft Word - 23g - ISS HA-ECT FIPS[removed]Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 08:43:12
776Museology / Error detection and correction / Archival science / Library science / Cryptographic hash function / Information science / Hash function / Digital preservation / Hashing / Cryptography / Data quality

ACE: a Novel Software Platform to Ensure the Long Term Integrity of Digital Archives Sangchul Song, Joseph JaJa; Institute for Advanced Computer Studies, Department of Electrical and Computer Engineering, University of M

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2008-09-10 16:10:09
777Internet protocols / Data / Secure communication / Hashing / Cryptographic hash functions / HMAC / IPsec / Cipher suite / SHA-1 / Cryptography / Cryptographic protocols / Computing

Microsoft Word - 8e - 4x_RFS7K_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 16:11:46
778Peer-to-peer computing / Computing / Cryptographic hash functions / Hashing / Dwolla / Cryptography / Software / Bitcoin

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis

Add to Reading List

Source URL: www.federalreserve.gov

Language: English - Date: 2014-12-19 13:00:16
779Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
780Computing / Search algorithms / Data privacy / Identity management / Privacy / Bloom filter / Hash function / Differential privacy / Internet privacy / Cryptography / Hashing / Ethics

arXiv:1407.6981v2 [cs.CR] 25 Aug[removed]RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response Úlfar Erlingsson

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-08-26 04:40:08
UPDATE