2010
DOI: 10.1016/j.comnet.2009.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Receiver-oriented design of Bloom filters for data-centric routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The observed distribution of outputs within an experiment, measured as the Hamming distance between output bit vectors (BV), was very close to the mean value of m/2 bits (128) with a small standard deviation. 4 The observed average number of bits set and their distribution were comparable to standard iBF constructs. Additionally, we analyzed whether the 20 most frequent bit positions set in secure iBFs corresponded to bits set in plain iBFs.…”
Section: Securitymentioning
confidence: 60%
See 2 more Smart Citations
“…The observed distribution of outputs within an experiment, measured as the Hamming distance between output bit vectors (BV), was very close to the mean value of m/2 bits (128) with a small standard deviation. 4 The observed average number of bits set and their distribution were comparable to standard iBF constructs. Additionally, we analyzed whether the 20 most frequent bit positions set in secure iBFs corresponded to bits set in plain iBFs.…”
Section: Securitymentioning
confidence: 60%
“…Now, we allow a different number of bits k per candidate. For instance, with d = 8 the distribution of k among the candidates is [4,4,5,5,6,6,7,7]. Intuitively, this naming scheme adapts better to the total number of elements in the iBF (k closer to k opt = ln(2) * m n ).…”
Section: Distribution Of the Number Of Hash Functions (K)mentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, we can answer a membership query for any object s i , and a user can check whether all bits h j .s i / are set to 1 for 1 j k. If not, SBF returns "false", i.e., s i is not a member of S. Otherwise, we assume that s i is a member of S . Due to hash collisions, an SBF may yield a false positive if it wrongly identifies an object s i as belonging to S. The cause is that all bits at SBFOEh j .s i / for 1 j k have been set to one by other objects in S [12] . The false positive probability can be theoretically derived as follows [13,14] :…”
Section: Sbf-based Set Reconciliation Methodsmentioning
confidence: 99%
“…Hitherto, the applications of BF and its variants are manyfold. In the field of networking, BF has been employed to enable routing and forwarding [2] [3] [4] [5] [6] [7] [8], web caching [9] [10], network monitoring [11], security enhancement [12] [13], content delivering [14], etc. In the area of databases, BF is a proper option to support query and search [15] [16], privacy preservation [17], key-value store [18] [19], content synchronization [20] [21] [22] [23] [24], duplicate detection [25] and so on.…”
Section: Introductionmentioning
confidence: 99%