Merkle tree (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Merkle tree" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
1,669th place
1,290th place
11th place
8th place
low place
low place
3,153rd place
2,332nd place
800th place
676th place
1,514th place
1,024th place
low place
low place
low place
low place
207th place
136th place
low place
low place
low place
low place
274th place
309th place
383rd place
320th place
6,184th place
4,465th place
low place
low place
9,107th place
6,668th place
low place
low place

aosabook.org

  • Adam Marcus. "The NoSQL Ecosystem". aosabook.org. When a replica is down for an extended period of time, or the machine storing hinted handoffs for an unavailable replica goes down as well, replicas must synchronize from one another. In this case, Cassandra and Riak implement a Dynamo-inspired process called anti-entropy. In anti-entropy, replicas exchange Merkle trees to identify parts of their replicated key ranges which are out of sync. A Merkle tree is a hierarchical hash verification: if the hash over the entire keyspace is not the same between two replicas, they will exchange hashes of smaller and smaller portions of the replicated keyspace until the out-of-sync keys are identified. This approach reduces unnecessary data transfer between replicas which contain mostly similar data.

doi.org

espacenet.com

worldwide.espacenet.com

  • US patent 4309569, Ralph Merkle, "Method of providing digital signatures", published Jan 5, 1982, assigned to The Board of Trustees of the Leland Stanford Junior University 

github.com

likai.org

lifecs.likai.org

nixos.org

open-content.net

oracle.com

blogs.oracle.com

phex.org

psu.edu

citeseerx.ist.psu.edu

rfc-editor.org

rub.de

emsec.rub.de

  • Becker, Georg (2008-07-18). "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis" (PDF). Ruhr-Universität Bochum. p. 16. Archived from the original (PDF) on 2014-12-22. Retrieved 2013-11-20.

semanticscholar.org

api.semanticscholar.org

sourceforge.net

gtk-gnutella.sourceforge.net

dcplusplus.sourceforge.net

springer.com

link.springer.com

symantec.com

uwaterloo.ca

cacr.uwaterloo.ca

waveprotocol.org

web.archive.org

  • Becker, Georg (2008-07-18). "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis" (PDF). Ruhr-Universität Bochum. p. 16. Archived from the original (PDF) on 2014-12-22. Retrieved 2013-11-20.
  • Bonwick, Jeff (2005-12-08). "ZFS End-to-End Data Integrity". blogs.oracle.com. Archived from the original on April 3, 2012. Retrieved 2013-09-19.
  • "General Verifiable Federation". Google Wave Protocol. Archived from the original on 2018-04-08. Retrieved 2017-03-09.
  • Chapweske, J.; Mohr, G. (March 4, 2003). "Tree Hash EXchange format (THEX)". Archived from the original on 2009-08-03.
  • "Audit: P2P DirectConnect Application". Symantec. Archived from the original on January 29, 2015. Retrieved 23 September 2018.