Skip to search formSkip to main contentSkip to account menu

Merkle tree

Known as: Tiger-Tree Hash, TTH, Merkle 
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Flux trapping adversely affects the superconducting electronic circuit operation. Circuit designers would benefit from a tool to… 
2014
2014
In this paper we define and explore proof of violation (POV) for cloud storage systems. A POV scheme enables a user or a service… 
2009
2009
Certificate validation is much more complex in mobile ad hoc networks than in conventional networks because online access to… 
2009
2009
Ubiquitous multi-core-based web servers and edge routers are increasingly popular in deploying computationally intensive Deep… 
2007
2007
5 Chapter 1: Introduction 6 Chapter 2: The Basics 8 2.1 Hash and One–Way Functions 8 2.1.1 One Way Functions 8 2.1.2 Hash… 
2007
2007
IP telephony has become one of the most successful applications of the peer-to-peer paradigm. However, providing a scalable peer… 
2003
2003
Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the… 
2003
2003
INTRODUCAO: A cefaleia do tipo tensional (CTT), dor cefalica mais comum, tem mecanismos fisiopatologicos, epidemiologia e… 
1999
1999
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of public-key certificates is a… 
1990
1990
SummaryBody temperature and duration of foraging activities were affected by the concentration of sucrose solution imbibed. When…