ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Bloom Filters"

From ForensicsWiki
Jump to: navigation, search
m
m
 
Line 8: Line 8:
 
* [http://dfrws.org/2006/proceedings/11-Roussev.pdf md5bloom: Forensic filesystem hashing revisited], Vassil Roussev*, Yixin Chen, Timothy Bourg, Golden G. Richard III , 2006 DFRWS. Published by Elsevier Ltd.
 
* [http://dfrws.org/2006/proceedings/11-Roussev.pdf md5bloom: Forensic filesystem hashing revisited], Vassil Roussev*, Yixin Chen, Timothy Bourg, Golden G. Richard III , 2006 DFRWS. Published by Elsevier Ltd.
  
* [https://mice.cs.columbia.edu:443/getTechreport.php?techreportID=483 Privacy-Enhanced Searches Using Encrypted Bloom Filters], Bellovin and Cheswick, Columbia Univerisity Technical Report CUCS-034-07, 2004  <a href='http://dimacs.rutgers.edu/Workshops/Privacy/slides/bellovin.pdf'>[DIMACS 2004 slides]</a>
+
* [https://mice.cs.columbia.edu:443/getTechreport.php?techreportID=483 Privacy-Enhanced Searches Using Encrypted Bloom Filters], Bellovin and Cheswick, Columbia Univerisity Technical Report CUCS-034-07, 2004  [http://dimacs.rutgers.edu/Workshops/Privacy/slides/bellovin.pdf' DIMACS 2004 slides]

Latest revision as of 04:08, 7 May 2008

References