<--- Back to Details
First PageDocument Content
Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games
Date: 2009-11-27 08:30:51
Cryptographic hash functions
Cryptography
Hashing
Information retrieval
Error detection and correction
Applied mathematics
SHA-2
Merkle tree
SHA-1
Hash list
Baseball at the 2013 East Asian Games
Baseball at the 2007 Southeast Asian Games

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

Add to Reading List

Source URL: digitalpiglet.org

Download Document from Source Website

File Size: 3,01 MB

Share Document on Facebook

Similar Documents

Microsoft PowerPoint - Lect12advanced_data.ppt

Microsoft PowerPoint - Lect12advanced_data.ppt

DocID: 1qKBn - View Document

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

DocID: 1qrSH - View Document

Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

DocID: 1q0Ep - View Document

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

DocID: 1pM6D - View Document

Rescuing Tit-for-Tat with Source Coding Thomas Locher, Stefan Schmid, Roger Wattenhofer {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzer

Rescuing Tit-for-Tat with Source Coding Thomas Locher, Stefan Schmid, Roger Wattenhofer {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzer

DocID: 1pKZn - View Document