Explore >> Select a destination


You are here

questionableengineering.com
| | lsd.gnunet.org
13.0 parsecs away

Travel
| | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defin...
| | lsd.gnunet.org
13.0 parsecs away

Travel
| | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defin...
| | www.allthingsdistributed.com
11.9 parsecs away

Travel
| | Werner Vogels on building scalable and robust distributed systems
| | www.arcserve.com
75.3 parsecs away

Travel
| Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms.