Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
collision probability
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 10:47am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 10:02am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces