SHA

Results: 7306



#Item
201BitTorrent / Intellectual property law / Computer jargon / Leech / Tragedy of the commons / Peer-to-peer

Dynamics of heterogeneous peer-to-peer networks Fernando Paganini, Andr´es Ferragut and Mart´ın Zubeld´ıa Universidad ORT Uruguay Abstract— The most tractable models of population dynamics in peer-to-peer file sha

Add to Reading List

Source URL: fi.ort.edu.uy

Language: English
202Computing / Computer architecture / Cryptography / Central processing unit / Parallel computing / Instruction set architectures / Scrypt / Salsa20 / SIMD / ARM architecture / X86 / SHA-2

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-10-25 04:56:20
203Routing / Routing algorithms / Network protocols

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah*, Mo Sha^, Paras Tiwari, Chenyang Lu, Yixin Chen Cyber-Physical Systems Lab,Washington Univers

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2016-04-23 00:07:16
204

Schedulability Analysis under Graph Routing in WirelessHART Networks Abusayeed Saifullah† , Dolvara Gunatilaka‡ , Paras Tiwari‡ , Mo Sha? , Chenyang Lu‡ , Bo Li‡ Chengjie Wu‡ , and Yixin Chen‡ Department of

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2015-08-14 14:47:38
    205

    Maximizing Network Lifetime of WirelessHART Networks under Graph Routing Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah*, Mo Sha^, Paras Tiwari, Chenyang Lu, Yixin Chen Cyber-Physical Systems Lab,Washington Univers

    Add to Reading List

    Source URL: www.cse.wustl.edu

    Language: English - Date: 2016-04-21 16:42:14
      206

      A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

      Add to Reading List

      Source URL: webdocs.cs.ualberta.ca

      Language: English - Date: 2009-10-06 18:16:29
        207Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

        Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

        Add to Reading List

        Source URL: www.estv.admin.ch

        Language: English
        208Humancomputer interaction / Information Age / Social information processing / Collective intelligence / Web 2.0 / Library 2.0 / Personalization / Social networking service / World Wide Web / Usability / Tag / National Science Digital Library

        Digital Library 2.0 for Educational Resources Monika Akbar1 , Weiguo Fan1 , Clifford A. Shaffer1 , Yinlin Chen1 , Lillian Cassel2 , Lois Delcambre3 , Daniel D. Garcia4 , Gregory W. Hislop5 , Frank Shipman6 , Richard Fu

        Add to Reading List

        Source URL: www.cs.utep.edu

        Language: English - Date: 2011-10-12 16:36:05
        209Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Hash function / SHA-2 / Password / SHA-1 / Salt / MD5 / Crypt

        Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-02-03 09:25:05
        UPDATE