🔍
Search Results - arrangements+for+secret+or+secure+communication
1
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing
An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists...
Published: 3/13/2025
|
Inventor(s):
Roberto Tamassia
,
Michael Goodrich
Keywords(s):
Arrangements for Secret or Secure Communication
,
Computing; Calculating; Counting
,
Electric Communication Technique
,
Electrical Digital Data Processing
,
Electricity
,
Physics
,
Transmission of Digital Information
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Healthcare IT
,
Technology Classifications > Industrial Tech > Energy, Infrastructure & Environment
,
Technology Classifications > Computers, Electronics & Software
,
Technology Classifications > Industrial Tech
JHTV Home
|
Search
|
Login/Subscribe
2017 - 2022 © Johns Hopkins Technology Ventures. All Rights Reserved. Powered by
Inteum