Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
Proceedings ArticleDOI
Simplifying data integration: the design of the desert software development environment
TL;DR: The Desert environment has been created to demonstrate that the facilities typically associated with expensive data integration can be provided inexpensively in an open framework.
Proceedings ArticleDOI
Scalable data naming for application level framing in reliable multicast
Suchitra Raman,Steven McCanne +1 more
TL;DR: A new data naming scheme is proposed that toss the structure of apphcation data to the transport layer, thereby mcing the ~\TrXbti@ of= apphcations’ r&abti@ and ordering se mantiw.
Proceedings Article
A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces
TL;DR: A network layer waypoint (3rd-party network agent) service called AVES is proposed that can provide general connectivity and does not require any change to existing IP hosts or IP network routers for easy deployment.
Journal ArticleDOI
Building access control policy model for privacy preserving and testing policy conflicting problems
Hua Wang,Lili Sun,Elisa Bertino +2 more
TL;DR: A purpose-based access control model in distributed computing environment for privacy preserving policies and mechanisms is proposed, and algorithms for policy conflicting problems are described.
Book
Open Systems Networking: Tcp/Ip and Osi
TL;DR: This book compares the TCP/IP and OSI architectures and examines each of the protocol layers, using a "top-down" approach, which deals first with the user-visible distributed applications (such as electronic mail, directories, and network management) and then with the way in which these applications are supported by lower-layer networking protocols.