Hash tree

Results: 206



#Item
101Chord / Peer-to-peer / Tree / Sybil attack / Kademlia / BATON Overlay / Distributed data storage / Computing / Distributed hash table

Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
102Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2015-04-20 01:14:27
103Web crawlers / Artificial intelligence / Distributed web crawling / Distributed hash table / Tree / A* search algorithm / Topology / Distributed data storage / Information science / Computing

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications Seyed M. Mirtaheri, Di Zou, Gregor V. Bochmann, Guy-Vincen

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2013-12-21 13:38:38
104Error detection and correction / Search algorithms / Cryptographic hash function / Hash function / Digital signature / Hash tree / RSA / Crypt / Cryptography / Public-key cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2004 Assignment #4 Due: Friday, March 12th. No late days allowed.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-03 16:21:52
105Error detection and correction / Message authentication codes / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
106Hashing / Error detection and correction / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / RSA / One-way compression function / Cryptography / Cryptographic hash functions / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-14 15:44:45
107Error detection and correction / Public-key cryptography / Hash function / Digital signature / RSA / Hash tree / Collision resistance / One-way compression function / UMAC / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-28 17:43:23
108Error detection and correction / Search algorithms / Hash tree / Hash list / Hash function / SHA-1 / Hash table / Lamport signature / Cryptographic hash functions / Hashing / Cryptography

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-03-20 00:13:33
109Suffix tree / Rope / Trie / Suffix array / Search engine indexing / LZ77 and LZ78 / String searching algorithm / Hash function / Kolmogorov complexity / Information science / Information retrieval / Information

MRCSI: Compressing and Searching String Collections with Multiple References Sebastian Wandelt and Ulf Leser Humboldt-Universitat ¨ zu Berlin, Wissensmanagement in der Bioinformatik,

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-12-17 10:07:16
110Distributed computing / Distributed hash table / Chord / Koorde / Gnutella / Peer-to-peer / Prefix hash tree / Routing / Overlay network / Distributed data storage / Computing / Concurrent computing

The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC Berkeley

Add to Reading List

Source URL: www.huebsch.org

Language: English - Date: 2005-01-09 01:57:21
UPDATE