Bloom Filters in Adversarial Environments (Q3457085): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Created claim: Wikidata QID (P12): Q127732535, #quickstatements; #temporary_batch_1722490750963
 
(7 intermediate revisions by 5 users not shown)
description / endescription / en
scientific article
scientific article; zbMATH DE number 7136427
Property / zbMATH Open document ID
 
Property / zbMATH Open document ID: 1454.68034 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1145/3306193 / rank
 
Normal rank
Property / author
 
Property / author: Yogev Eylon / rank
 
Normal rank
Property / published in
 
Property / published in: ACM Transactions on Algorithms / rank
 
Normal rank
Property / publication date
 
25 November 2019
Timestamp+2019-11-25T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 day
Before0
After0
Property / publication date: 25 November 2019 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 7136427 / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W201721620 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2952451113 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1412.8356 / rank
 
Normal rank
Property / zbMATH Keywords
 
Bloom filter
Property / zbMATH Keywords: Bloom filter / rank
 
Normal rank
Property / zbMATH Keywords
 
adaptive inputs
Property / zbMATH Keywords: adaptive inputs / rank
 
Normal rank
Property / zbMATH Keywords
 
pseudorandom functions
Property / zbMATH Keywords: pseudorandom functions / rank
 
Normal rank
Property / zbMATH Keywords
 
streaming algorithm
Property / zbMATH Keywords: streaming algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit and efficient hash families suffice for cuckoo hashing with a stash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness Preserving Reductions via Cuckoo Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Space/time trade-offs in hash coding with allowable errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Clocked adversaries for hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algorithm for approximate membership checking with application to password security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sketching in Adversarial Environments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sliding Bloom Filters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Uniform Hashing in Constant Time and Optimal Space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A theory of the learnable / rank
 
Normal rank
Property / cites work
 
Property / cites work: BLAKE2: Simpler, Smaller, Fast as MD5 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Learnability and the Vapnik-Chervonenkis dimension / rank
 
Normal rank
Property / cites work
 
Property / cites work: Network Applications of Bloom Filters: A Survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exact and approximate membership testers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5501239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct Data Structures for Retrieval and Approximate Membership (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost random graphs with simple hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Intel’s New AES Instructions for Enhanced Performance and Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: How robust are linear sketches to adaptive inputs? / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sometimes-Recurse Shuffle / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the construction of pseudorandom permutations: Luby-Rackoff revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight bounds for sliding Bloom filters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2921747 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cache-, hash-, and space-efficient bloom filters / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q127732535 / rank
 
Normal rank

Latest revision as of 06:43, 1 August 2024

scientific article; zbMATH DE number 7136427
Language Label Description Also known as
English
Bloom Filters in Adversarial Environments
scientific article; zbMATH DE number 7136427

    Statements

    Bloom Filters in Adversarial Environments (English)
    0 references
    0 references
    0 references
    0 references
    10 December 2015
    0 references
    25 November 2019
    0 references
    Bloom filter
    0 references
    adaptive inputs
    0 references
    pseudorandom functions
    0 references
    streaming algorithm
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references