Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Hash-Based'
Hash-Based published presentations and documents on DocSlides.
Cryptology Digital Signatures and Digital Certificates
by conchita-marotz
Prof. David . Singer . Dept. of . Mathematics. Ca...
Drug Free Office Overview and Drug Trends
by phoebe-click
Health Services Department. August 25, 2015. Pres...
Chapter 15 –The Java
by jane-oiler
. Collections Framework. Chapter. . Goals. To ...
TLS – Cached Information
by stefany-barnette
Stefan Santesson. 3xA Security . (. http://AAA-se...
Slide 13- 1 Copyright © 2007
by alexa-scheidler
Ramez Elmasri and Shamkant B. Navathe. Chapter 13...
CS 3700 Networks and Distributed Systems
by tawny-fly
Network Security Basics. Definitions. Principles....
Concurrent Tries with Efficient Non-blocking Snapshots
by lindy-dunigan
Aleksandar. . Prokopec. Phil Bagwell. Martin . O...
HOW TO READ YOUR COORDINATE SHEETS
by olivia-moreira
Richmond Marching Band. Updated 2015. This is wha...
Public-Coin Concurrent
by liane-varnes
Zero-Knowledge. in . the Global Hash . Model. Ran...
Parallel Databases COMP3017 Advanced Databases
by calandra-battersby
Dr Nicholas . Gibbins - . nmg. @ecs.soton.ac.uk. ...
Lecture 17: Distributed Transactions
by test
11/8/2017. Recap: Parallel Query Processing. Thre...
SAVI Objects: Sharing and
by marina-yarberry
Virtuality. Incorporated. Izzat El Hajj (Illinoi...
Gentle Giant Isaiah 8 Dr. Joseph Chang
by karlyn-bohler
5/18/2014. I. A True Giant Is . Here. . 1. The ....
Data Security and Cryptology, XI
by olivia-moreira
Digital Signature, its’ Infrastructure and Usa...
Communications Security Yaakov (J)
by tawny-fly
Stein. CTO. Communications Security. Communicatio...
Cheap and Large CAMs for High Performance Data-Intensive Networked Systems
by cheryl-pisano
Ashok Anand. , . Chitra. . Muthukrishnan. , Stev...
Operating Systems Security
by natalia-silvester
1. The Boot Sequence. The action of loading an op...
Network Support For
by min-jolicoeur
IP . Traceback. Stefan Savage, David Wetherall, A...
EN.600.424
by alida-meadow
Fall 2016. Lecture Notes. Cryptography. The Crypt...
Brief Announcement
by lois-ondreau
: Using . Multi-Level . Parallelism and . 2-3 Cuc...
Oslo Hash House Harriers, 25
by yoshiko-marsland
th Year Anniversary , 13 to 15 June, 2014 REDNECK ...
Digital Certificates
by conchita-marotz
Digital certificates serve the purpose of validat...
Query-Friendly Compression
by alexa-scheidler
of . Graph Streams. Arijit Khan. Charu. C. Aggar...
Data Security and Cryptology, XI
by aaron
Digital Signature, its’ Infrastructure and Usa...
Mining Data Streams
by min-jolicoeur
(Part . 2). Mining of Massive Datasets. Jure Lesk...
Query Processing and Query Optimization
by lois-ondreau
Database System Implementation CSE 507. Some slid...
Basic Cryptography
by kittie-lecroy
1. What is cryptography?. Cryptography is a mathe...
Precept 6
by liane-varnes
Hashing & Partitioning. 1. Peng Sun. Server L...
Recitation Outline
by olivia-moreira
Hash tables in C++ STL. u. nordered_set. (. mult...
Hacker Tools for Ethical Hackers to Protect Windows Clients
by stefany-barnette
Erdal. . Ozkaya. – KEMP Technologies. Raymond...
Concentration, Randomized Algorithms
by test
Miles. Jones. MTThF. 8:30-9:50am. CSE 4140. Aug...
Asymmetric Encryption
by alida-meadow
Announcements. Essay due. Next homework – crypt...
Key Exchange
by lindy-dunigan
References:. Applied Cryptography, Bruce Schneier...
TWC : Pass-the-Hash and Credential Theft Mitigation Archite
by celsa-spraggs
Mark Simos, Nicholas DiCola. DCIM-B213. Agenda. M...
Security of Message Digests
by briana-ranney
CSCI 5857: Encoding and Encryption. Outline. Atta...
John Spaid, CTO
by test
October 2015. What’s New in PKI and SSL?. The S...
Payment systems
by lois-ondreau
Tuomas Aura. CSE-C3400 . Information security. Aa...
Chord
by trish-goza
A Scalable Peer-to-peer Lookup Service for Intern...
Python Dictionaries
by lois-ondreau
Prof. Kelly M. Thayer. Week 10 Lecture. 2016-11-0...
Translucent
by myesha-ticknor
Databases. CSCI 6442. ©2015, . David C. Roberts,...
Load More...