نتایج جستجو برای: bloom filter

تعداد نتایج: 130787  

2013

The false data injection attack is a major security threat in Wireless Sensor Network (WSN) since is degrades the network capability. The bandwidth efficient cooperative authentication (BECAN) scheme is used for filtering the false data injection attack. It is used to save energy of sensor nodes in WSN by early detection and filtering of maximum possible injected false data. Source authenticati...

2013
Eung Jun Cho Choong Seon Hong Sungwon Lee Seokhee Jeon

The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery...

2017
Isaac Keslassy

Bloom filters and Counting Bloom Filters (CBFs) are widely used in networking device algorithms. They implement fast set representations to support membership queries with limited error. Unlike Bloom filters, CBFs also support element deletions. In the first part of the talk, I will introduce a new general method based on variable increments to improve the efficiency of CBFs and their variants....

Journal: :Computers & Electrical Engineering 2014
Shahabeddin Geravand Mahmood Ahmadi

With the easy access to the huge volume of articles available on the Internet, plagiarism is getting worse and worse. Most recent approaches proposed to address this problem usually focus on achieving better accuracy of similarity detection process. However, there are some real applications where plagiarized contents should be detected without revealing any information. Moreover, in such web-ba...

2012
Zhijun Li Guang Gong

Designing secure data aggregation schemes, which are critical to many sensor network applications, imposes interesting and formidable challenges. In this paper, we propose a succinct and practical secure aggregation protocol by combining HMAC (associated with a cryptographic hash function) with Bloom filter, which then is defined as secure Bloom filter. Unlike most previous approaches, which ar...

2012
Homa Hosseinmardi Nikolaus Correll Richard Han

This article presents an efficient ad hoc multicast communication protocol for next-generation cyber-physical systems and computational materials. Communication with such systems would be gestural, and when cells within such materials detect a motion, they would share that information with each other. We want to achieve efficient communication among only the group of nodes that sense a particul...

2014
Tiejian LUO Zhu WANG Fuxing CHENG Xin ZHANG Xiang WANG

Distributed architectures are widely used in Internet applications nowadays. In such systems, one of the key techniques is how to maintain an indexing data structure which records elements of each single node in the system. Bloom filter is one of the popular solutions. The beautiful mathematical format offers a fast and space-efficient solution for probabilistic membership presentation. In many...

Journal: :International Journal of Advanced Computer Science and Applications 2018

2012
Mohammad Alaggan Sébastien Gambs Anne-Marie Kermarrec

In this paper, we consider the scenario in which the profile of a user is represented in a compact way, as a Bloom filter, and the main objective is to privately compute in a distributed manner the similarity between users by relying only on the Bloom filter representation. In particular, we aim at providing a high level of privacy with respect to the profile even if a potentially unbounded num...

2007
Vincenzo Liberatore

We consider the educational objective of learning how to prove a statement in a mathematically rigorous way and we break down this educational objective into several partial objectives following the standard taxonomy of Bloom, 1956]. Three advantages stem from this approach: rst, the partial objectives are more manageable in the process of curriculum development; second, it is easier to individ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید