Login / Signup
Towards cryptographically-authenticated in-memory data structures.
Setareh Ghorshi
Lachlan J. Gunn
Hans Liljestrand
N. Asokan
Published in:
CoRR (2022)
Keyphrases
</>
data structure
main memory
external memory
bloom filter
memory requirements
limited memory
data types
computing power
hash table
database
memory size
index structure
b tree
suffix tree
efficient data structures