PASSWORD GENERATION BY BLOOM FILTERS

被引:0
|
作者
STALLINGS, W [1 ]
机构
[1] COMP COMM CONSULTING,BREWSTER,MA
来源
DR DOBBS JOURNAL | 1994年 / 19卷 / 08期
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:119 / &
相关论文
共 50 条
  • [31] Low Computational Cost Bloom Filters
    Lu, Jianyuan
    Yang, Tong
    Wang, Yi
    Dai, Huichen
    Chen, Xi
    Jin, Linxiao
    Song, Haoyu
    Liu, Bin
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (05) : 2254 - 2267
  • [32] Tight Bounds for Sliding Bloom Filters
    Naor, Moni
    Yogev, Eylon
    [J]. ALGORITHMICA, 2015, 73 (04) : 652 - 672
  • [33] Tight Bounds for Sliding Bloom Filters
    Moni Naor
    Eylon Yogev
    [J]. Algorithmica, 2015, 73 : 652 - 672
  • [34] Mesh network firewalling with bloom filters
    Maccari, Leonardo
    Fantacci, Romano
    Neira, P.
    Gasca, R. M.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1546 - +
  • [35] Basket bloom filters for membership queries
    Xie, Kun
    Min, Ying-Hua
    Zhang, Da-Fang
    Xie, Gao-Gang
    Wen, Ji-Gang
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (04): : 597 - 607
  • [36] The performance analysis of Bloom and Random filters
    Chang, CC
    Leu, JJ
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1996, 19 (04) : 451 - 458
  • [37] Synchronizing Namespaces with Invertible Bloom Filters
    Fu, Wenliang
    Ben Abraham, Hila
    Crowley, Patrick
    [J]. ELEVENTH 2015 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS, 2015, : 123 - 134
  • [38] Cryptographically Secure Bloom-Filters
    Nojima, Ryo
    Kadobayashi, Youki
    [J]. TRANSACTIONS ON DATA PRIVACY, 2009, 2 (02) : 131 - 139
  • [39] A Comment on "Fast Bloom Filters and Their Generalization"
    Reviriego, P.
    Christensen, K.
    Maestro, J. A.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 303 - 304
  • [40] Distance-Sensitive Bloom Filters
    Kirsch, Adam
    Mitzenmacher, Michael
    [J]. PROCEEDINGS OF THE EIGHTH WORKSHOP ON ALGORITHM ENGINEERING AND EXPERIMENTS AND THE THIRD WORKSHOP ON ANALYTIC ALGORITHMICS AND COMBINATORICS, 2006, : 41 - 50