<--- Back to Details
First PageDocument Content
Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games
Date: 2009-11-27 08:30:51
Cryptographic hash functions
Cryptography
Hashing
Information retrieval
Error detection and correction
Applied mathematics
SHA-2
Merkle tree
SHA-1
Hash list
Baseball at the 2013 East Asian Games
Baseball at the 2007 Southeast Asian Games

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

Add to Reading List

Source URL: digitalpiglet.org

Download Document from Source Website

File Size: 3,01 MB

Share Document on Facebook

Similar Documents

July, Nippon Life Insurance Company Notice Regarding Partial Amendment to the Press Release Dated February 12, 2016 “Financial Results for the Nine Months Ended December 31, 2015” and the Press Release Dated

July, Nippon Life Insurance Company Notice Regarding Partial Amendment to the Press Release Dated February 12, 2016 “Financial Results for the Nine Months Ended December 31, 2015” and the Press Release Dated

DocID: 1pAx5 - View Document

Introduction to the Social Web Content Search, Recommendation and Exploration Sihem Amer-Yahia Behrooz Omidvar-Tehrani CNRS/LIG

Introduction to the Social Web Content Search, Recommendation and Exploration Sihem Amer-Yahia Behrooz Omidvar-Tehrani CNRS/LIG

DocID: 1pdYd - View Document

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

DocID: 1lWTK - View Document