×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [cryptographic hash]
The Agent Based Crypto Protocol The ABC-Protocol by Jordan Hind MSE Presentation 2
229 views
Semantics Consistent Parallelism Li-Yi Wei Microsoft Research
220 views
Computer Forensics. What is Computer Forensics? Scientific process of preserving, identifying, extracting, documenting, and interpreting data on a computer
237 views
A Reference Architecture for Distributed Software Deployment
750 views
The Nix project
297 views
The Nix project
129 views
Using NixOS for declarative deployment and testing
225 views
Alice vs Bob
35 views
NET Assembly
13 views
“Defeating SSL” Impact of Hash collisions on cyber security By vaibhav
223 views
ISO 16363 & OAI-PMH By Neal Harmeyer, Amy Hatfield, and Brandon Beatty PURDUE UNIVERSITY RESEARCH REPOSITORY
229 views
6/1/2015C. Edward ChowCS591 Page 1 CS 591 Fundamentals of Computer and Network Security C. Edward Chow cs591
217 views
Next >