2020
DOI: 10.1016/j.comcom.2019.12.029
|View full text |Cite
|
Sign up to set email alerts
|

Dual-load Bloom filter: Application for name lookup

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…The performance of packet forwarding is highly dependent on the speed of the name lookup and is determined by the efficiency of the LPM. For these reasons, many previous studies on packet forwarding in NDN focused on improving the speed of the name lookup by increasing the efficiency of LPM [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19].…”
Section: Name Lookup In Ndn Packet Forwardingmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of packet forwarding is highly dependent on the speed of the name lookup and is determined by the efficiency of the LPM. For these reasons, many previous studies on packet forwarding in NDN focused on improving the speed of the name lookup by increasing the efficiency of LPM [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19].…”
Section: Name Lookup In Ndn Packet Forwardingmentioning
confidence: 99%
“…Those techniques primarily focused on reducing the average number of memory accesses per lookup to speed up the name lookup. Alternatively, hashing techniques were used to achieve efficient name lookups [9][10][11][12][13][14][15], since a name consists of several components, each of which is a variable-length string. The hashing techniques are generally used to map variable-size data to a fixed-size value.…”
Section: Introductionmentioning
confidence: 99%
“…A Bloom filter and its variant structures have been popularly used for many applications due to their simple and space-efficient nature identifying non-members of a given set [34][35][36][37][38][39][40].…”
Section: Bloom Filter Theorymentioning
confidence: 99%
“…The role of the PDBF is to store all the challenge information and challenge length held on the authentication server to improve the security of the PWM-PUF. The PDBF is the structure referred to in [49], [53], and [54] in which one cell stores 2 bits, and the false negative of the CBF is removed. Also, the cell positions are shifted from the hash indices by the challenge length.…”
Section: Puf Database Bloom Filter (Pdbf)mentioning
confidence: 99%
“…Figure 8 can be compared with the false positive of theoretical analysis. The theoretical analysis is referenced to in [54]. If n c is the number of challenges in the authentication server, n crp is the number of CRPs in the authentication server, k is the number of hash functions, and m is the number of cells, and p pd is the probability that a particular cell is set at least once by n c elements in the PDBF, p pd is defined in Equation 3:…”
Section: Performance Evaluationmentioning
confidence: 99%