<--- Back to Details
First PageDocument Content
Cryptographic hash functions / File sharing networks / Computing / Security / Fingerprint / Identifiers / Public key fingerprint / Peer-to-peer / Hash list / Hashing / Cryptography / Error detection and correction
Date: 2013-05-22 08:58:22
Cryptographic hash functions
File sharing networks
Computing
Security
Fingerprint
Identifiers
Public key fingerprint
Peer-to-peer
Hash list
Hashing
Cryptography
Error detection and correction

Multimedia Systems DOI[removed]s00530[removed]REGULAR PAPER Privacy-aware peer-to-peer content distribution

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Download Document from Source Website

File Size: 626,67 KB

Share Document on Facebook

Similar Documents

ライフサイエンス分野 Persistent Identifiers for Rice Genomics: Harvests of PRAGMA and RDA Jason Haga Cyber-physical Cloud Research Group, AIST, Japan

DocID: 1vnyF - View Document

Identifying 3.5 billions source code files Intrinsic identifiers, the Software Heritage experience Roberto Di Cosmo (Software Heritage, INRIA)

DocID: 1vkiz - View Document

CSC CWID-50 and -51 CW Station Identifiers

DocID: 1vcXu - View Document

IRUS-UK best practices for cataloguing identifiers and exposing them in OAI-PMH There are a number of key canonical identifiers, which IRUS-UK needs to capture reliably when ingesting data in order to: 1. Facilitate inte

DocID: 1v3LM - View Document

SAFETY DATA SHEET (SDS) TOXICOLOGY URINE CONTROLS 1.0 PRODUCT AND COMPANY IDENTIFICATION 1.1. Product identifiers Product Name: MEDTOX Toxicology Urine Control products including the following:

DocID: 1uZmt - View Document