<--- Back to Details
First PageDocument Content
Cryptographic hash functions / File sharing networks / Computing / Security / Fingerprint / Identifiers / Public key fingerprint / Peer-to-peer / Hash list / Hashing / Cryptography / Error detection and correction
Date: 2013-05-22 08:58:22
Cryptographic hash functions
File sharing networks
Computing
Security
Fingerprint
Identifiers
Public key fingerprint
Peer-to-peer
Hash list
Hashing
Cryptography
Error detection and correction

Multimedia Systems DOI[removed]s00530[removed]REGULAR PAPER Privacy-aware peer-to-peer content distribution

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Download Document from Source Website

File Size: 626,67 KB

Share Document on Facebook

Similar Documents

Biometrics / Live scan / Criminal records / Prevention / Cryptography / Fingerprint / Background check / Safety / Public key fingerprint

Self-Determination Program Criminal Background Checks DRAFT Who is required to get a background check? Anyone who provides direct personal care services to participants in

DocID: 1rqm5 - View Document

Cryptography / Public-key cryptography / Key management / Public key infrastructure / Authentication / Computer access control / Key server / Public key fingerprint / Public key certificate / Key / Pretty Good Privacy

Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

DocID: 1riYH - View Document

Fingerprinting algorithms / Biometrics / Morpho / Cryptography / Fingerprint / Public key fingerprint / Security / Surveillance

Texas Lottery® Sales Licensing Electronic Fingerprinting Instructions Applicants for a Texas Lottery Sales License must provide fingerprints for use in conducting a check of criminal history records of the Texas Departm

DocID: 1qNR6 - View Document

Biometrics / Identification / Fingerprint / Fingers / Human anatomy / Cryptography / Public key fingerprint / Security

Instructions for Completing Fingerprint Card

DocID: 1qlfe - View Document

Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

DocID: 1qe1I - View Document