C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach.
Fangyong Hou
Zhiying Wang
Yuhua Tang
Jifeng Liu
Published in:
EUC (2004)
Keyphrases
</>
hash table
b tree
tree structure
memory usage
main memory
hash functions
limited memory
tree structures
combining multiple
search algorithm
memory requirements
r tree
integrity constraints
tree search
bloom filter
wireless sensor networks
tree construction
high dimensional