You are here |
questionableengineering.com | ||
| | | |
lsd.gnunet.org
|
|
| | | | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defin... | |
| | | |
lsd.gnunet.org
|
|
| | | | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defin... | |
| | | |
www.allthingsdistributed.com
|
|
| | | | Werner Vogels on building scalable and robust distributed systems | |
| | | |
www.arcserve.com
|
|
| | Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms. |