Back to Results
First PageMeta Content
Cryptographic hash functions / Secret sharing / Advanced Encryption Standard / Reed–Solomon error correction / Padding / SHA-2 / Password / Cryptography / Cryptographic protocols / Cleversafe


Document Date: 2011-01-11 11:43:15


Open Document

File Size: 455,39 KB

Share Result on Facebook

City

Chicago / San Jose / /

Company

AES / BitTorrent / Google / Systems Jason K. Resch Development Cleversafe Inc. / Cleversafe Inc / Intel / /

Currency

Rs / /

/

Facility

EECS Department University of Tennessee Knoxville / James S. Plank EECS Department University of Tennessee / Java’s FEC library / S. Riverside Plaza / /

IndustryTerm

dot products / metadata management / storage software / secret sharing algorithm / cipher/hash algorithms / plank@cs.utk.edu clude storage systems / hash algorithm / information dispersal algorithm / main dispersal algorithms / open source tools / dispersal algorithms / storage network / matrix-vector product / storage systems / hash algorithms / encryption algorithms / dispersal algorithm / file protocols / encryption algorithm / software architecture / /

OperatingSystem

Linux / /

Organization

EECS Department University of Tennessee Knoxville / University of Tennessee / /

Person

Shamir Rabin / Jason K. Resch / James S. Plank / /

/

Position

rogue system administrator / Contact Author / /

Product

OpenSSL 0.9.8k / Luigi Rizzo / Reed-Solomon / Java HotSpot(TM) 64 / Java HotSpot 64 / /

ProgrammingLanguage

Java / R / C / K / /

ProvinceOrState

Illinois / Tennessee / Manitoba / California / /

Technology

RAM / Storage Technologies / dispersal algorithm / three algorithms / three main dispersal algorithms / hash algorithm / peer-to-peer / encryption algorithm / Linux / AONT-RS dispersal algorithms / cipher/hash algorithms / Rabin algorithms / X3430 processor / key-based encryption algorithm / AONT-RS algorithms / encryption / Ethernet / X3460 processor / AONT-RS protocol / two hash algorithms / digital certificate / 2 Dispersal Algorithms / Java / information dispersal algorithm / K. The encryption / secret sharing algorithm / two encryption algorithms / three dispersal algorithms / file protocols / 5 Algorithm / iSCSI / dispersal algorithms / /

URL

http /

SocialTag