Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Bloom B (1970) Space/time tradeoffs in hash coding with allowable errors. Commun ACM 13(7):422–426
2. Bringer J, Morel C, Rathgeb C (2015) Security analysis of bloom filter based iris biometric template protection. In: Proceedings of international conference on biometrics, pp 527–534
3. Bringer J, Morel C, Rathgeb C (2017) Security analysis and improvement of some biometric protected templates based on Bloom filters. Image Vis Comput 58:239–253
4. Broder A, (1997) On the resemblance and containment of documents. In: Proceedings of the compression and complexity of Sequences, proceedings of compression and complexity of SEQUENCES 1997, IEEE Computer Society, Los Alamitos, pp 21–29
5. Broder A, Mitzenmacher M (2005) Network applications of bloom filters: a survey. Internet Math 1(4):485–509
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献