First Page | Document Content | |
---|---|---|
Date: 2009-05-12 14:48:13Hashing Cryptographic hash functions Error detection and correction Web archiving Digital libraries Digital preservation Merkle tree SHA-1 Hash function Wayback Machine Hash list Database | Microsoft Word - Indo-US-Workshop-jaja.docAdd to Reading ListSource URL: wiki.umiacs.umd.eduDownload Document from Source WebsiteFile Size: 150,33 KBShare Document on Facebook |
Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian PerrigDocID: 1phYN - View Document | |
Microsoft Word - Indo-US-Workshop-jaja.docDocID: 1oUI6 - View Document | |
SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian PerrigDocID: 1oDfz - View Document | |
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow onlineDocID: 1ov99 - View Document | |
The Future of Massively Distributed Services on the Internet Mark Hapner Sun MicrosystemsDocID: 1otZ9 - View Document |