Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,697,257 papers from all fields of science
Search
Sign In
Create Free Account
Merkle tree
Known as:
Tiger-Tree Hash
, TTH
, Merkle
Expand
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Apache Cassandra
Apache Wave
Binary tree
BitTorrent
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Flux Trapping Analysis in Superconducting Circuits
Kyle Jackman
,
C. Fourie
IEEE transactions on applied superconductivity
2017
Corpus ID: 12201014
Flux trapping adversely affects the superconducting electronic circuit operation. Circuit designers would benefit from a tool to…
Expand
2014
2014
Real-Time Proof of Violation for Cloud Storage
Gwan-Hwan Hwang
,
Wei-Sian Huang
,
Jenn-Zjone Peng
IEEE International Conference on Cloud Computing…
2014
Corpus ID: 18234285
In this paper we define and explore proof of violation (POV) for cloud storage systems. A POV scheme enables a user or a service…
Expand
2009
2009
Certificate status validation in mobile ad hoc networks
J. Forné
,
J. L. Muñoz
,
Francisca Hinarejos
,
O. Esparza
IEEE wireless communications
2009
Corpus ID: 10841404
Certificate validation is much more complex in mobile ad hoc networks than in conventional networks because online access to…
Expand
2009
2009
An adaptive hash-based multilayer scheduler for L7-filter on a highly threaded hierarchical multi-core server
Danhua Guo
,
Guangdeng Liao
,
L. Bhuyan
,
B. Liu
Symposium on Architectures for Networking and…
2009
Corpus ID: 10227995
Ubiquitous multi-core-based web servers and edge routers are increasingly popular in deploying computationally intensive Deep…
Expand
2007
2007
Merkle Tree Traversal Techniques
Boris I. Ederov
2007
Corpus ID: 61409777
5 Chapter 1: Introduction 6 Chapter 2: The Basics 8 2.1 Hash and One–Way Functions 8 2.1.1 One Way Functions 8 2.1.2 Hash…
Expand
2007
2007
Extended Prefix Hash Trees for a distributed phone book application
Fabian Stäber
,
Gerald Kunzmann
,
J. Müller
International Conference on Parallel and…
2007
Corpus ID: 13874697
IP telephony has become one of the most successful applications of the peer-to-peer paradigm. However, providing a scalable peer…
Expand
2003
2003
Certificate revocation system implementation based on the Merkle hash tree
J. L. Muñoz
,
J. Forné
,
O. Esparza
,
M. Soriano
International Journal of Information Security
2003
Corpus ID: 13510649
Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the…
Expand
2003
2003
Sintomas depressivos e ansiedade em pacientes com cefaléia do tipo tensional crônica e episódica
André Martins da Matta
,
P. Filho
2003
Corpus ID: 73074500
INTRODUCAO: A cefaleia do tipo tensional (CTT), dor cefalica mais comum, tem mecanismos fisiopatologicos, epidemiologia e…
Expand
1999
1999
Performance evaluation of public-key certificate revocation system with balanced hash tree
H. Kikuchi
,
K. Abe
,
S. Nakanishi
Cooperative Multimodal Communication
1999
Corpus ID: 43686180
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of public-key certificates is a…
Expand
1990
1990
Foraging profits and thoracic temperature of honey bees (Apis mellifera)
K. Waddington
Journal of Comparative Physiology □ B
1990
Corpus ID: 25439303
SummaryBody temperature and duration of foraging activities were affected by the concentration of sucrose solution imbibed. When…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE