Chucky: A Succinct Cuckoo Filter for LSM-Tree

Author(s):  
Niv Dayan ◽  
Moshe Twitto
Keyword(s):  
Author(s):  
Lailong Luo ◽  
Deke Guo ◽  
Ori Rottenstreich ◽  
Richard T. B. Ma ◽  
Xueshan Luo ◽  
...  
Keyword(s):  

Author(s):  
Ziyue Hu ◽  
Menglu Wu ◽  
Xiaopeng Fan ◽  
Yang Wang ◽  
Chengzhong Xu

2019 ◽  
Vol 75 (9) ◽  
pp. 5667-5687 ◽  
Author(s):  
A. A. Abdulhassan ◽  
M. Ahmadi

2019 ◽  
Vol 147 ◽  
pp. 55-60 ◽  
Author(s):  
Pedro Reviriego ◽  
Salvatore Pontarelli ◽  
Gil Levy
Keyword(s):  

2020 ◽  
Vol 21 (1) ◽  
pp. 101-105
Author(s):  
A Rengarajan ◽  
M Mohammed Thaha

Providing security for vehicular communication is essential since the network is vulnerable to severe attacks.The message authentication between vehicles and pavement units are essential for the purpose of security. Messages that passed between the vehicles should be encrypted and verified before the vehicle nodes could be trusted. The original identity of nodes can only be traceable by authorized parties and should not be exposed at any cause. However authentication between vehicles during message transformation does not guarantees message authentication rate accurately. To address these issues, the SPCACF scheme is proposed which is based on software devoid of relying on any particular hardware. Binary search algorithm is added in partial with Cuckoo Filter to achieve higher accomplishment than the preceding schemes in the batch wise verification phase. In order to guarantee that it can assure message authentication constraint, existential enforceability of underlying signature against adaptively chosen-message attack is proved under the positive filter pool method.


2021 ◽  
Author(s):  
Fengkai Yuan ◽  
Kai Wang ◽  
Rui Hou ◽  
Xiaoxin Li ◽  
Peinan Li ◽  
...  
Keyword(s):  

Author(s):  
Bin Fan ◽  
Dave G. Andersen ◽  
Michael Kaminsky ◽  
Michael D. Mitzenmacher
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document