Essays about: "bloom filter"

Showing result 1 - 5 of 8 essays containing the words bloom filter.

  1. 1. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiahao Wang; [2022]
    Keywords : Wi-Fi Aware; Secure Service Discovery; Bloom Filter; TESLA; Client Puzzle; Wi-Fi Aware; Säker Serviceupptäckt; Bloom Filter; TESLA; Klient Pussel;

    Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE

  2. 2. Evaluation of length aware Bloom filter for longest prefix matching using Waldvogels binary search on lengths

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Olof Brücher; [2022]
    Keywords : Longest Prefix Matching; Waldvogels Binary Search on Lengths; Bloom filter; Length aware Bloom filter;

    Abstract : Longest prefix matching is a well-studied problem in the context of IP-packet forwarding, an area of computational specialization where high performance with low memory impact is of the essence. Numerous specialized data structures exist for longest prefix matching in this setting, among them is Waldvogels binary search on lengths, WBSL for short. READ MORE

  3. 3. Secure and Privacypreserving V2X multicast DNS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ayub Atif; Justin Arieltan; [2020]
    Keywords : Vehicular Communications; DNS; Security and Privacy; PKI; Pseudonym; Bloom Filter; Vehicle Multi-hop Protocol; Fordonskommunikation; DNS; Säkerhet och integritet; PKI; Pseudonym; Bloom filter; Fordons multihopp-protokoll;

    Abstract : The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. READ MORE

  4. 4. Privacy Preserving Audit Proofs

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Anton Lindqvist; [2017]
    Keywords : privacy; audit; logging; security; bloom filter; merkle tree;

    Abstract : The increased dependence on computers for critical tasks demands sufficient and transparent methods to audit its execution. This is commonly solved using logging where the log must not only be resilient against tampering and rewrites in hindsight but also be able to answer queries concerning (non)-membership of events in the log while preserving privacy. READ MORE

  5. 5. A Web Scraper For Forums : Navigation and text extraction methods

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Michael Palma; Shidi Zhou; [2017]
    Keywords : Data mining; Web Scraper; Java; Web forums; Text-extraction; Link Duplicates; Data mining; Web Scraper; Java; Web forums; Text-extraction; Link Duplicates;

    Abstract : Web forums are a popular way of exchanging information and discussing various topics. These websites usually have a special structure, divided into boards, threads and posts. Although the structure might be consistent across forums, the layout of each forum is different. READ MORE