R Patgiri, S Nayak… - … Conference on Information …, 2021 - ieeexplore.ieee.org
Today, millions of devices produce billions of network requests to the servers. All these request packets need to be scanned for security. Hence, providing network security and …
S Nayak, R Patgiri - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
Bloom Filter is a probabilistic data structure for the membership query, and it has been intensely experimented in various fields to reduce memory consumption and enhance a …
T Zheng, T Zhou, K Lu, Z Cai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Due to the immense benefits of guaranteeing user privacy, popular messaging platforms have shown enthusiasm for deploying End-to-End Encryption (E2EE). However, E2EE could …
The rapid rise of data value, such as social media and mobile applications, results in large volumes of data, which is what the term “big data” refers to. The increased rate of data …
W Yi, C Wang, Q Xie, Y Zhao, J Jia - Sensors, 2023 - mdpi.com
Given the challenges associated with the dynamic expansion of the conventional bloom filter's capacity, the prevalence of false positives, and the subpar access performance, this …
S Nayak, R Patgiri - arXiv preprint arXiv:2106.04365, 2021 - arxiv.org
Bloom Filter is an important probabilistic data structure to reduce memory consumption for membership filters. It is applied in diverse domains such as Computer Networking, Network …
R Patgiri - 2021 8th IEEE International Conference on Cyber …, 2021 - ieeexplore.ieee.org
Apart from Security and privacy, there are crucial requirements of secrecy for modern practice in Cloud Computing. Secrecy protocol keeps client's data secret, and it protects the …
R Patgiri, MD Borah - 2022 IEEE International Performance …, 2022 - ieeexplore.ieee.org
Merkle tree is applied in diverse applications, namely, Blockchain, smart grid, IoT, Biomedical, financial transactions, etc., to verify authenticity and integrity. Also, the Merkle …
Data secrecy is a major concern in many domains. Nowadays, the data are kept in tight security with high privacy. Users do not want to share their secret information with anyone; …