Explore: Hashing (computer Science)
Discover books, insights, and more — all in one place.
Learn more about Hashing (computer Science) with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “hashing-%28computer-science%29”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1The design and analysis of coalesced hashing
By Jeffrey Scott Vitter

“The design and analysis of coalesced hashing” Metadata:
- Title: ➤ The design and analysis of coalesced hashing
- Author: Jeffrey Scott Vitter
- Language: English
- Number of Pages: Median: 160
- Publisher: Oxford University Press
- Publish Date: 1987
- Publish Location: New York
“The design and analysis of coalesced hashing” Subjects and Themes:
- Subjects: ➤ Hashing (Computer science) - Hash-Algorithmus - Informatique - Mémoire - Probabilité - Information storage and retrieval systems
Edition Identifiers:
- The Open Library ID: OL2719529M
- Online Computer Library Center (OCLC) ID: 13795458
- Library of Congress Control Number (LCCN): 86012870
- All ISBNs: 0195041828 - 9780195041828
Access and General Info:
- First Year Published: 1987
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The design and analysis of coalesced hashing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hashing in Computer Science
By Alan G. Konheim

“Hashing in Computer Science” Metadata:
- Title: Hashing in Computer Science
- Author: Alan G. Konheim
- Language: English
- Number of Pages: Median: 386
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2010 - 2011
“Hashing in Computer Science” Subjects and Themes:
- Subjects: Computer security - Mathematics - Hashing (Computer science) - Cryptography - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL29038133M - OL39870583M - OL29074712M - OL48645158M - OL29061248M - OL29018881M
- Online Computer Library Center (OCLC) ID: 840106467
- Library of Congress Control Number (LCCN): 2009052123
- All ISBNs: ➤ 0470630612 - 1118031830 - 0470344733 - 0470630604 - 9780470344736 - 9781118031834 - 1282686275 - 1118125622 - 9781282686274 - 9780470630617 - 9780470630600 - 9781118125625
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hashing in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3The keyed-hash message authentication code (HMAC)
By Information Technology Laboratory (National Institute of Standards and Technology)
“The keyed-hash message authentication code (HMAC)” Metadata:
- Title: ➤ The keyed-hash message authentication code (HMAC)
- Author: ➤ Information Technology Laboratory (National Institute of Standards and Technology)
- Language: English
- Number of Pages: Median: 13
- Publisher: ➤ U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory
- Publish Date: 2002
- Publish Location: Gaithersburg, MD
“The keyed-hash message authentication code (HMAC)” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL17631324M - OL18274849M - OL18213920M - OL15595504M - OL16141835M
- Online Computer Library Center (OCLC) ID: 75959291
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The keyed-hash message authentication code (HMAC) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Secure hash standard
By National Institute of Standards and Technology (U.S.)
“Secure hash standard” Metadata:
- Title: Secure hash standard
- Author: ➤ National Institute of Standards and Technology (U.S.)
- Language: English
- Number of Pages: Median: 79
- Publisher: ➤ Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration - For sale by the National Technical Information Service - Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration
- Publish Date: 1995 - 2002
- Publish Location: ➤ Gaithersburg, MD - Springfield, VA
“Secure hash standard” Subjects and Themes:
- Subjects: ➤ Handbooks, manuals, etc - Handbooks, manuals - Computer security - Information storage and retrieval systems - Electronic data processing - Hashing (Computer science)
Edition Identifiers:
- The Open Library ID: OL17683619M - OL17726499M - OL14456315M - OL17631082M - OL14555622M
- Online Computer Library Center (OCLC) ID: 32832467 - 73168061
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure hash standard at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Password Authentication for Web and Mobile Apps
The Developer's Guide To Building Secure User Authentication
By Dmitry Chestnykh

“Password Authentication for Web and Mobile Apps” Metadata:
- Title: ➤ Password Authentication for Web and Mobile Apps
- Author: Dmitry Chestnykh
- Publisher: Independently published
- Publish Date: 2020
“Password Authentication for Web and Mobile Apps” Subjects and Themes:
- Subjects: ➤ Computer security - Authentication - Passwords - Computers -- Access control -- Passwords - 2FA - bcrypt - scrypt - Hashing (Computer science) - Cryptography
Edition Identifiers:
- The Open Library ID: OL40570067M
- All ISBNs: 9798649303095
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Password Authentication for Web and Mobile Apps at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Hash crack
By Netmux, LLC

“Hash crack” Metadata:
- Title: Hash crack
- Author: Netmux, LLC
- Language: English
- Number of Pages: Median: 81
- Publisher: ➤ CreateSpace Independent Publishing Platform
- Publish Date: 2016
“Hash crack” Subjects and Themes:
- Subjects: Computers - Hashing (Computer science) - Passwords - Computer security - Access control
Edition Identifiers:
- The Open Library ID: OL27043032M
- Online Computer Library Center (OCLC) ID: 971136622
- All ISBNs: 9781540444967 - 1540444961
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hash crack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7A general purpose scatter storage subsystem and a comparison of hashing methods
By Steven C. Macy
“A general purpose scatter storage subsystem and a comparison of hashing methods” Metadata:
- Title: ➤ A general purpose scatter storage subsystem and a comparison of hashing methods
- Author: Steven C. Macy
- Language: English
- Publisher: ➤ National Technical Information Service, distributor - Engineering Research, College of Engineering Sciences and Technology, Brigham Young University
- Publish Date: 1984
- Publish Location: ➤ [Provo, Utah?] - [Springfield, Va
“A general purpose scatter storage subsystem and a comparison of hashing methods” Subjects and Themes:
- Subjects: Hashing (Computer science)
Edition Identifiers:
- The Open Library ID: OL18069090M - OL15393849M
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A general purpose scatter storage subsystem and a comparison of hashing methods at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Randomized hashing for digital signatures
By Quynh Dang
“Randomized hashing for digital signatures” Metadata:
- Title: ➤ Randomized hashing for digital signatures
- Author: Quynh Dang
- Language: English
- Number of Pages: Median: 13
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology
- Publish Date: 2008
- Publish Location: Gaithersburg, MD
“Randomized hashing for digital signatures” Subjects and Themes:
- Subjects: Digital signatures - Standards - Government policy - Hashing (Computer science)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL53481043M
- Online Computer Library Center (OCLC) ID: 816292269
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Randomized hashing for digital signatures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Searching algorithms
By J. Wiedermann
“Searching algorithms” Metadata:
- Title: Searching algorithms
- Author: J. Wiedermann
- Language: English
- Number of Pages: Median: 123
- Publisher: B.G. Teubner
- Publish Date: 1987
- Publish Location: Leipzig
“Searching algorithms” Subjects and Themes:
- Subjects: ➤ Computer algorithms - Data structures (Computer science) - Hashing (Computer science) - Algorithms
Edition Identifiers:
- The Open Library ID: OL2099744M
- Online Computer Library Center (OCLC) ID: 17719145
- Library of Congress Control Number (LCCN): 88147622
- All ISBNs: 3322004333 - 9783322004338
Access and General Info:
- First Year Published: 1987
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Searching algorithms at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10VLSI circuits for cryptographic authentication
By Luca Henzen
“VLSI circuits for cryptographic authentication” Metadata:
- Title: ➤ VLSI circuits for cryptographic authentication
- Author: Luca Henzen
- Language: English
- Number of Pages: Median: 181
- Publisher: Hartung-Gorre Verlag
- Publish Date: 2011
- Publish Location: Konstanz
“VLSI circuits for cryptographic authentication” Subjects and Themes:
- Subjects: ➤ Cryptography - Digital communications - Very large scale integration - Security measures - Hashing (Computer science) - Integrated circuits - Design and construction
Edition Identifiers:
- The Open Library ID: OL30449455M
- Online Computer Library Center (OCLC) ID: 751516596
- Library of Congress Control Number (LCCN): 2011402657
- All ISBNs: 9783866283671 - 3866283679
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find VLSI circuits for cryptographic authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Concurrency and linear hashing
By Carla Schlatter Ellis
“Concurrency and linear hashing” Metadata:
- Title: Concurrency and linear hashing
- Author: Carla Schlatter Ellis
- Language: English
- Number of Pages: Median: 22
- Publisher: University of Rochester
- Publish Date: 1985
- Publish Location: Rochester
“Concurrency and linear hashing” Subjects and Themes:
- Subjects: Hashing (Computer science)
Edition Identifiers:
- The Open Library ID: OL16615645M
Access and General Info:
- First Year Published: 1985
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Concurrency and linear hashing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Adapting geometric hashing to account for sensor error
By Matthew Pennant Howell
“Adapting geometric hashing to account for sensor error” Metadata:
- Title: ➤ Adapting geometric hashing to account for sensor error
- Author: Matthew Pennant Howell
- Language: English
- Number of Pages: Median: 72
- Publish Date: 1994
“Adapting geometric hashing to account for sensor error” Subjects and Themes:
- Subjects: Hashing (Computer science) - Error analysis (Mathematics) - Detectors - Pattern recognition systems
Edition Identifiers:
- The Open Library ID: OL14708366M
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Adapting geometric hashing to account for sensor error at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13A lexical analogy to feature matching and pose estimation
By John Albert Horst
“A lexical analogy to feature matching and pose estimation” Metadata:
- Title: ➤ A lexical analogy to feature matching and pose estimation
- Author: John Albert Horst
- Language: English
- Number of Pages: Median: 10
- Publisher: ➤ U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
- Publish Date: 2002
- Publish Location: Gaithersburg, MD
“A lexical analogy to feature matching and pose estimation” Subjects and Themes:
- Subjects: ➤ Computer logic - Hashing (Computer science) - File processing (Computer science) - File organization (Computer science)
Edition Identifiers:
- The Open Library ID: OL15358040M
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A lexical analogy to feature matching and pose estimation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14The keyed-hash message authentication code (HMAC)
By Information Technology Laboratory (National Institute of Standards and Technology)
“The keyed-hash message authentication code (HMAC)” Metadata:
- Title: ➤ The keyed-hash message authentication code (HMAC)
- Author: ➤ Information Technology Laboratory (National Institute of Standards and Technology)
- Language: English
- Number of Pages: Median: 13
- Publisher: ➤ U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory
- Publish Date: 2002
- Publish Location: Gaithersburg, MD
“The keyed-hash message authentication code (HMAC)” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL14556254M
- Online Computer Library Center (OCLC) ID: 75959291
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The keyed-hash message authentication code (HMAC) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Design of hashing algorithms
By Josef Pieprzyk

“Design of hashing algorithms” Metadata:
- Title: Design of hashing algorithms
- Author: Josef Pieprzyk
- Language: English
- Number of Pages: Median: 194
- Publisher: Springer-Verlag - Springer
- Publish Date: 1993
- Publish Location: New York - Berlin
“Design of hashing algorithms” Subjects and Themes:
- Subjects: Computer algorithms - Computer security - Hashing (Computer science)
Edition Identifiers:
- The Open Library ID: OL1429910M
- Online Computer Library Center (OCLC) ID: 29256237
- Library of Congress Control Number (LCCN): 93041251
- All ISBNs: 0387575006 - 9780387575001 - 9783540575009 - 3540575006
Access and General Info:
- First Year Published: 1993
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Design of hashing algorithms at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Hashing in computer science
By Alan G. Konheim

“Hashing in computer science” Metadata:
- Title: Hashing in computer science
- Author: Alan G. Konheim
- Language: English
- Publisher: John Wiley & Sons
- Publish Date: 2010
- Publish Location: Hoboken, N.J
“Hashing in computer science” Subjects and Themes:
- Subjects: ➤ Hashing (Computer science) - Data encryption (Computer science) - Computer security - Cryptography
Edition Identifiers:
- The Open Library ID: OL24002451M
- Library of Congress Control Number (LCCN): 2009052123
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hashing in computer science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17A lexical analogy to feature matching and pose estimation
By John Horst
“A lexical analogy to feature matching and pose estimation” Metadata:
- Title: ➤ A lexical analogy to feature matching and pose estimation
- Author: John Horst
- Language: English
- Number of Pages: Median: 10
- Publisher: ➤ U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
- Publish Date: 2002
- Publish Location: Gaithersburg, MD
“A lexical analogy to feature matching and pose estimation” Subjects and Themes:
- Subjects: ➤ Computer logic - Hashing (Computer science) - File processing (Computer science) - File organization (Computer science)
Edition Identifiers:
- The Open Library ID: OL13630512M
- Online Computer Library Center (OCLC) ID: 50263055
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A lexical analogy to feature matching and pose estimation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.