keywords bloom filters; security; pollution attacks; black-box adversaries; pollution; fingerprint recognition; probabilistic logic; data structures