Skip to search formSkip to main contentSkip to account menu

Merkle tree

Known as: Tiger-Tree Hash, TTH, Merkle 
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The known security proofs for hash tree time-stamping assume collision-resistance (CR). An asymptotically optimally tight proof… 
2009
2009
Certificate validation is much more complex in mobile ad hoc networks than in conventional networks because online access to… 
2009
2009
Ubiquitous multi-core-based web servers and edge routers are increasingly popular in deploying computationally intensive Deep… 
2007
2007
5 Chapter 1: Introduction 6 Chapter 2: The Basics 8 2.1 Hash and One–Way Functions 8 2.1.1 One Way Functions 8 2.1.2 Hash… 
2007
2007
IP telephony has become one of the most successful applications of the peer-to-peer paradigm. However, providing a scalable peer… 
2005
2005
We propose extensions to existing web protocols that allow proofs of authenticity of HTTP server responses, whether or not the… 
2005
2005
Mining frequent patterns in large transactional databases is a highly researched area in the field of data mining. The different… 
2002
2002
  • J. KimE. Golliher
  • 2002
  • Corpus ID: 25433457
Loop Heat Pipes (LHP) have been demonstrated to be able to passively transport orders of magnitude more heat than conventional… 
1999
1999
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of public-key certificates is a… 
1990
1990
SummaryBody temperature and duration of foraging activities were affected by the concentration of sucrose solution imbibed. When…