Login / Signup
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach.
Fangyong Hou
Zhiying Wang
Yuhua Tang
Jifeng Liu
Published in:
EUC (2004)
Keyphrases
</>
hash table
b tree
tree structure
memory usage
main memory
hash functions
limited memory
tree structures
combining multiple
search algorithm
memory requirements
r tree
integrity constraints
tree search
bloom filter
wireless sensor networks
tree construction
high dimensional