News

The graph below shows the total number of publications each year in Bloom Filters and Hash Functions in Data Structures. References [1] eBF: an enhanced Bloom Filter for intrusion detection in IoT .
Hash tables have been around since the 1950s, and are an example of a key-value store where a hash function is used to generate the index for the data value based on the key itself.