Search results

Jump to navigation Jump to search
  • Die Zugangsknoten zum Internet bilden die Wurzel (root) von Bäumen (trees). Es bilden sich Unterbäume (sub trees). Mehrere Netzwerkkarten werden unterteilt in UP-NICs und DOWN-NICs.
    3 KB (360 words) - 10:19, 26 April 2005
  • This object-level representation has the advantage, that the indexing trees which are used to provide the routing information in the network, are const
    10 KB (1,668 words) - 15:23, 19 July 2007
  • ** SHA-256 Hash basierend auf allen Transaktionen (Wurzel eines Hash-Trees zur Kompression)
    8 KB (1,003 words) - 20:48, 14 February 2012
  • .... Keyless signatures’ infrastructure: How to build global distributed hash-trees. In Nordic Conference on Secure IT Systems (pp. 313-320). Berlin, Heidelber
    25 KB (3,417 words) - 14:37, 3 December 2023