Date: 2009-11-27 08:30:51Cryptographic hash functions Cryptography Hashing Information retrieval Error detection and correction Applied mathematics SHA-2 Merkle tree SHA-1 Hash list Baseball at the 2013 East Asian Games Baseball at the 2007 Southeast Asian Games | | On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009Add to Reading ListSource URL: digitalpiglet.orgDownload Document from Source Website File Size: 3,01 MBShare Document on Facebook
|