作者: Mark L. Buer
DOI:
关键词: Theoretical computer science 、 Dynamic perfect hashing 、 Hash tree 、 SHA-2 、 Computer science 、 Secure Hash Algorithm 、 Hash chain 、 Double hashing 、 Hash function 、 Hash buster
摘要: Methods and associated systems for processing data are disclosed. A hashing function sequentially processes a hash key to generate value. policy management system packets according defined policies.