Sign Up to like & get
recommendations!
1
Published in 2018 at "ICT Express"
DOI: 10.1016/j.icte.2017.12.001
Abstract: Abstract In Vehicular Ad hoc Networks (VANETs), broadcasted beacon messages are critical as most safety applications rely on them. However, the design of a secure broadcast authentication faces many security and privacychallenges as vehicles are…
read more here.
Keywords:
lightweight authentication;
authentication;
privacy preserving;
bloom filters ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Computational Biology"
DOI: 10.1089/cmb.2016.0155
Abstract: Abstract Using a sequence's k-mer content rather than the full sequence directly has enabled significant performance improvements in several sequencing applications, such as metagenomic species identification, estimation of transcript abundances, and alignment-free comparison of sequencing…
read more here.
Keywords:
bloom filters;
mer;
bloom;
mer bloom ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2018.2843318
Abstract: Bloom filters can be used in network intrusion detection systems to detect known attack signatures in packet payloads. In this paper we propose and analyze the potential application of superconductor flux quantum technology for streaming…
read more here.
Keywords:
streaming data;
superconductor;
bloom;
bloom filters ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3158469
Abstract: Bloom filters are widely used in networking and computing to accelerate membership checking. In many applications filters store sensitive data, so their privacy is of primary concern. At first glance, it seems that extracting the…
read more here.
Keywords:
bloom filters;
counting bloom;
elements inserted;
bloom ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2022.3145436
Abstract: Bloom filters are widely used to perform fast approximate membership checking in networking applications. The main limitation of Bloom filters is that they suffer from false positives that can only be reduced by using more…
read more here.
Keywords:
bloom;
bloom filters;
memory access;
one memory ... See more keywords