2017
DOI: 10.1049/iet-com.2016.0641
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Bloom filter for network protocols using AES instruction set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In fact, the number of positions with value v is unknown but it is possible to calculate the probability P r(I = v) of such position in CBF using (8). Then the expected number of such positions in CBF is determined via (11) and equals mP r(I = v). When the ABF suppresses all such positions each of them decrements the expected dot product by v/n.…”
Section: Probabilistic Characterization Of the Autoscaling Bloom Filtermentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, the number of positions with value v is unknown but it is possible to calculate the probability P r(I = v) of such position in CBF using (8). Then the expected number of such positions in CBF is determined via (11) and equals mP r(I = v). When the ABF suppresses all such positions each of them decrements the expected dot product by v/n.…”
Section: Probabilistic Characterization Of the Autoscaling Bloom Filtermentioning
confidence: 99%
“…In order to improve the speed of the membership check, the authors in [10] proposed a novel filter type called Ultra-Fast BFs. In [11] it was shown that BFs can be accelerated (in terms of processing speed) by using particular types of hashing functions.…”
Section: Introductionmentioning
confidence: 99%
“…The BFSV entries indexed by these signatures are set to 1, while the remaining entries keep the default value of 0. Non‐cryptographic hash functions, such as the universal type [17] and Murmur [18], are generally utilised in BFs, although some cryptographic hash functions have also been effectively used for BFs in existing works [19]. Two target strings may share all, some, or no signatures.…”
Section: Bfs and False Positive Ratementioning
confidence: 99%