Search results
Jump to navigation
Jump to search
- Die Zugangsknoten zum Internet bilden die Wurzel (root) von Bäumen (trees). Es bilden sich Unterbäume (sub trees). Mehrere Netzwerkkarten werden unterteilt in UP-NICs und DOWN-NICs.3 KB (360 words) - 10:19, 26 April 2005
- This object-level representation has the advantage, that the indexing trees which are used to provide the routing information in the network, are const10 KB (1,668 words) - 15:23, 19 July 2007
- ** SHA-256 Hash basierend auf allen Transaktionen (Wurzel eines Hash-Trees zur Kompression)8 KB (1,003 words) - 20:48, 14 February 2012
- .... Keyless signatures’ infrastructure: How to build global distributed hash-trees. In Nordic Conference on Secure IT Systems (pp. 313-320). Berlin, Heidelber25 KB (3,417 words) - 14:37, 3 December 2023