Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,530,358 papers from all fields of science
Search
Sign In
Create Free Account
Merkle tree
Known as:
Tiger-Tree Hash
, TTH
, Merkle
Expand
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Apache Cassandra
Apache Wave
Binary tree
BitTorrent
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Real-Time Proof of Violation for Cloud Storage
Gwan-Hwan Hwang
,
Wei-Sian Huang
,
Jenn-Zjone Peng
IEEE International Conference on Cloud Computing…
2014
Corpus ID: 18234285
In this paper we define and explore proof of violation (POV) for cloud storage systems. A POV scheme enables a user or a service…
Expand
2009
2009
Certificate status validation in mobile ad hoc networks
J. Forné
,
J. L. Muñoz
,
Francisca Hinarejos
,
O. Esparza
IEEE wireless communications
2009
Corpus ID: 10841404
Certificate validation is much more complex in mobile ad hoc networks than in conventional networks because online access to…
Expand
2009
2009
An adaptive hash-based multilayer scheduler for L7-filter on a highly threaded hierarchical multi-core server
Danhua Guo
,
Guangdeng Liao
,
L. Bhuyan
,
B. Liu
Symposium on Architectures for Networking and…
2009
Corpus ID: 10227995
Ubiquitous multi-core-based web servers and edge routers are increasingly popular in deploying computationally intensive Deep…
Expand
2007
2007
Merkle Tree Traversal Techniques
Boris I. Ederov
2007
Corpus ID: 61409777
5 Chapter 1: Introduction 6 Chapter 2: The Basics 8 2.1 Hash and One–Way Functions 8 2.1.1 One Way Functions 8 2.1.2 Hash…
Expand
2007
2007
Extended Prefix Hash Trees for a distributed phone book application
Fabian Stäber
,
Gerald Kunzmann
,
J. Müller
International Conference on Parallel and…
2007
Corpus ID: 13874697
IP telephony has become one of the most successful applications of the peer-to-peer paradigm. However, providing a scalable peer…
Expand
2005
2005
Merkle tree authentication of HTTP responses
R. Bayardo
,
Jeffrey Scott Sorensen
The Web Conference
2005
Corpus ID: 32283348
We propose extensions to existing web protocols that allow proofs of authenticity of HTTP server responses, whether or not the…
Expand
2003
2003
Sintomas depressivos e ansiedade em pacientes com cefaléia do tipo tensional crônica e episódica
André Martins da Matta
,
P. Filho
2003
Corpus ID: 73074500
INTRODUCAO: A cefaleia do tipo tensional (CTT), dor cefalica mais comum, tem mecanismos fisiopatologicos, epidemiologia e…
Expand
1999
1999
Performance evaluation of public-key certificate revocation system with balanced hash tree
H. Kikuchi
,
K. Abe
,
S. Nakanishi
Cooperative Multimodal Communication
1999
Corpus ID: 43686180
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of public-key certificates is a…
Expand
1990
1990
Foraging profits and thoracic temperature of honey bees (Apis mellifera)
K. Waddington
Journal of Comparative Physiology □ B
1990
Corpus ID: 25439303
SummaryBody temperature and duration of foraging activities were affected by the concentration of sucrose solution imbibed. When…
Expand
1958
1958
A Study of Anomalous Pressure Build-Up Behavior
G. L. Stegemeier
,
C. S. Matthews
1958
Corpus ID: 16365558
C. S. MA TTH EWS
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE