Description: Analysis and comparison of the application of hash function in information security, data structure and data mining, to find out the features and requirements of it in different areas in the field of information security in one-way, random and collision free, data structure as much as possible to reduce the collision, but the collision cannot be avoided, and the data mining for task allocation is uniform requirement of collision. This provides some useful reference for the study of the related courses so as to clarify some vague and confusing knowledge.
To Search:
File list (Check if you may need any files):
Filename | Size | Date |
---|
哈希函数的应用辨析.docx | 18383 | 2017-11-25 |