• The SoftWare Hash IDentifier (SWHID) is a persistent identifier used to uniquely identify a particular piece of software source code and its version. SWHID...
    7 KB (780 words) - 07:27, 12 June 2025
  • Extensible Resource Identifiers (XRIs) Persistent Uniform Resource Locators (PURLs) Software Hash Identifier (SWHID) Wikidata Identifier (e.g QIDs) Combined...
    5 KB (527 words) - 07:27, 27 May 2025
  • Universally Unique Identifier (UUID) is a 128-bit label used to uniquely identify objects in computer systems. The term Globally Unique Identifier (GUID) is also...
    38 KB (4,583 words) - 03:50, 16 June 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • Number sign (redirect from Hash sign)
    The symbol # is known as the number sign, hash, or (in North America) the pound sign. The symbol has historically been used for a wide range of purposes...
    41 KB (4,331 words) - 18:23, 18 June 2025
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • Thumbnail for International Mobile Equipment Identity
    The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite...
    26 KB (2,795 words) - 10:51, 1 June 2025
  • A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical...
    38 KB (4,555 words) - 17:35, 14 June 2025
  • with an identifier called an SWHID. In 2023, the expansion of SWHID was changed from Software Heritage identifier to software hash identifier. In order...
    13 KB (1,027 words) - 09:59, 27 May 2025
  • The International Chemical Identifier (InChI, pronounced /ˈɪntʃiː/ IN-chee) is a textual identifier for chemical substances, designed to provide a standard...
    24 KB (2,538 words) - 13:41, 28 February 2025
  • Thumbnail for MD4
    MD4 (redirect from MD4 hash)
    two MD4 hash operations. A theoretical preimage attack also exists. A variant of MD4 is used in the ed2k URI scheme to provide a unique identifier for a...
    8 KB (871 words) - 18:48, 12 January 2025
  • Thumbnail for IPv6 address
    64-bit interface identifier. This should be a pseudo-random number for privacy reasons. Also for privacy reasons, the interface identifier is different for...
    61 KB (8,455 words) - 23:15, 5 June 2025
  • Thumbnail for Chris Messina (inventor)
    prefixed with a hash symbol (as opposed to those local to a server, which use an ampersand). HTML has used # as a fragment identifier from the very start...
    16 KB (1,674 words) - 01:35, 29 May 2025
  • Thumbnail for Strongly typed identifier
    A strongly typed identifier is user-defined data type which serves as an identifier or key that is strongly typed. This is a solution to the "primitive...
    20 KB (1,803 words) - 13:34, 30 October 2024
  • Fingerprint (computing) (category Identifiers)
    National Software Reference Library, that uses cryptographic hash functions to fingerprint files and map them to software products. The HashKeeper database...
    6 KB (1,370 words) - 10:50, 10 May 2025
  • body hash (optionally limited to the first l octets of the body), d for the signing domain, and s for the selector. An Agent or User Identifier (AUID)...
    41 KB (4,978 words) - 15:33, 15 May 2025
  • URL (category Identifiers)
    hash (#). The fragment contains a fragment identifier providing direction to a secondary resource, such as a section heading in an article identified...
    17 KB (2,359 words) - 11:36, 28 May 2025
  • Permalink (category Identifiers)
    content-syndication software systems support such links. Sometimes URL shortening is used to create them. A permalink is a type of persistent identifier and the word...
    9 KB (1,083 words) - 21:45, 18 April 2025
  • Thumbnail for Git
    Git (redirect from Git software)
    attack. A plan for hash function transition is being written since February 2020. "Git" is a registered word trademark of Software Freedom Conservancy...
    71 KB (7,254 words) - 19:28, 2 June 2025
  • account's signature chain that contains the identifier history. The identifier used in Keybase is either the hash of the root of the user's signature chain...
    11 KB (1,557 words) - 03:48, 1 March 2025
  • Crypt (C) (category Cryptographic hash functions)
    Password Hashing Competition. The format is defined as: $<id>[$<param>=<value>(,<param>=<value>)*][$<salt>[$<hash>]] where id: an identifier representing...
    28 KB (3,038 words) - 15:00, 15 June 2025
  • conventions are the rules related to identifier length (i.e., the finite number of individual characters allowed in an identifier). Some rules dictate a fixed...
    36 KB (3,859 words) - 06:19, 28 May 2025
  • Bcrypt (category Cryptographic hash functions)
    \____________________/\_____________________________/ Alg Cost Salt Hash Where: $2a$: The hash algorithm identifier (bcrypt) 12: Input cost (212 i.e. 4096 rounds) R9h/cIPz0gi...
    27 KB (2,863 words) - 18:02, 18 June 2025
  • Thumbnail for Page table
    process; the OS may avoid reusing per-process identifier values to delay facing this. Alternatively, per-process hash tables may be used, but they are impractical...
    17 KB (2,462 words) - 20:30, 8 April 2025
  • Ed2k URI scheme (redirect from Ed2k (hash))
    BitTorrent) at once. eD2k links include file hashes, as these hashes can be used as a unique identifier for files within the network, so even if the linked-to...
    7 KB (958 words) - 18:06, 3 March 2025
  • {\displaystyle m} -bit identifier using consistent hashing. The SHA-1 algorithm is the base hashing function for consistent hashing. Consistent hashing is integral...
    17 KB (2,496 words) - 22:07, 25 November 2024
  • Thumbnail for GNUnet
    GNUnet (category GNU Project software)
    contains resource identifier, reply address, priority and TTL (Time-to-Live). Resource identifier of datum Q {\displaystyle Q} is a triple-hash H ( H ( H (...
    20 KB (2,141 words) - 18:57, 2 April 2025
  • Thumbnail for Passwd
    Passwd (category Unix authentication-related software)
    through a key derivation function to create a hashed version of the new password, which is saved. Only the hashed version is stored; the entered password is...
    16 KB (1,958 words) - 20:06, 4 March 2025
  • license identifier can be added to the top of source code files as a short string unambiguously declaring the license used. The SPDX-License-Identifier syntax...
    17 KB (1,456 words) - 16:56, 16 May 2025
  • interpretation and attributes of a set of identifiers. A definition of an identifier is a declaration for that identifier that: for an object [variable or constant]...
    215 KB (23,980 words) - 18:58, 14 June 2025