1
کامپیوتر و شبکه::
رمزنگار
Cryptographers had been trying to come up with a private, peer-to-peer
around intellectual property," cryptographer Timothy May wrote in the
Cryptographer Adam Back
used cryptographic hash functions to prove work had been done.
This is done using a cryptographic hash function, which works like a
واژگان شبکه مترجمین ایران