Merkle tree

Results: 29



#Item
1Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
2Microsoft Word - Indo-US-Workshop-jaja.doc

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2009-05-12 14:48:13
3SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
4Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
5The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:29
6Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2016-06-04 00:10:37
7On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:30:51
8VeriStream – A Framework for Verifiable Data Streaming Dominique Sch¨oder and Mark Simkin Saarland University Saarbr¨ ucken, Germany

VeriStream – A Framework for Verifiable Data Streaming Dominique Sch¨oder and Mark Simkin Saarland University Saarbr¨ ucken, Germany

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:17
9SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
10Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15