Author:
Santhosh Gayathri,Reshmi T. R.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference27 articles.
1. Luo, L., Guo, D., Ma, R.T., Rottenstreich, O., Luo, X.: Optimizing bloom filter: challenges, solutions, and comparisons. IEEE Commun. Surv. Tutor. 21(2), 1912–1949 (2018)
2. Didouh, A., Labiod, H., El Hillali, Y., Rivenq, A.: Blockchain-based collaborative certificate revocation systems using clustering. IEEE Access 10, 51487–51500 (2022)
3. Gupta, G., Yan, M., Coleman, B., Kille, B., Elworth, R. L., Medini, T., Shrivastava, A.: Fast processing and querying of 170tb of genomics data via a repeated and merged bloom filter (rambo). In: Proceedings of the International Conference on Management of Data, pp. 2226–2234 (2021)
4. Hughes, L.E.: Public Key Infrastructure (PKI). In: Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks, pp. 147–153 (2022)
5. Linn, J.,Nyström, M.: AttFiguretification: an enabling technology for delegation and role-based controls in distributed environments. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, pp. 121–130 (1999)