Figure 8From: Efficient hash tables for network applicationsVerifier hashing and buckets with multiple entries.Back to article page