메뉴 건너뛰기




Volumn 2832, Issue , 2003, Pages 2-5

Authenticated data structures

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL EFFICIENCY; QUERY PROCESSING;

EID: 0142246303     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39658-1_2     Document Type: Article
Times cited : (165)

References (22)
  • 1
    • 21044449695 scopus 로고    scopus 로고
    • Persistent authenticated dictionaries and their applications
    • Proc. Information Security Conference (ISC 2001), Springer-Verlag
    • A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379-393. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2200 , pp. 379-393
    • Anagnostopoulos, A.1    Goodrich, M.T.2    Tamassia, R.3
  • 3
    • 3543102859 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proc. CRYPTO, 2002.
    • (2002) Proc. CRYPTO
    • Camenisch, J.1    Lysyanskaya, A.2
  • 6
    • 84957806727 scopus 로고    scopus 로고
    • Efficient and fresh certification
    • Int. Workshop on Practice and Theory in Public Key Cryptography (PKC '2000), Springer-Verlag
    • I. Gassko, P. S. Gemmell, and P. MacKenzie. Efficient and fresh certification. In Int. Workshop on Practice and Theory in Public Key Cryptography (PKC '2000), volume 1751 of LNCS, pages 342-353. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1751 , pp. 342-353
    • Gassko, I.1    Gemmell, P.S.2    MacKenzie, P.3
  • 7
    • 35248897874 scopus 로고    scopus 로고
    • Design and implementation of a distributed authenticated dictionary and its applications
    • Center for Geometric Computing, Brown University
    • M. T. Goodrich, J. Lentini, M. Shin, R. Tamassia, and R. Cohen. Design and implementation of a distributed authenticated dictionary and its applications. Technical report, Center for Geometric Computing, Brown University, 2002. http://www.cs.brown.edu/cgc/stms/papers/stms.pdf.
    • (2002) Technical Report
    • Goodrich, M.T.1    Lentini, J.2    Shin, M.3    Tamassia, R.4    Cohen, R.5
  • 8
    • 21144440101 scopus 로고    scopus 로고
    • Authenticated dictionaries for fresh attribute credentials
    • Proc. Trust Management Conference, Springer
    • M. T. Goodrich, M. Shin, R. Tamassia, and W. H. Winsborough. Authenticated dictionaries for fresh attribute credentials. In Proc. Trust Management Conference, volume 2692 of LNCS, pages 332-347. Springer, 2003.
    • (2003) LNCS , vol.2692 , pp. 332-347
    • Goodrich, M.T.1    Shin, M.2    Tamassia, R.3    Winsborough, W.H.4
  • 9
    • 0141873829 scopus 로고    scopus 로고
    • Efficient authenticated dictionaries with skip lists and commutative hashing
    • Johns Hopkins Information Security Institute
    • M. T. Goodrich and R. Tamassia. Efficient authenticated dictionaries with skip lists and commutative hashing. Technical report, Johns Hopkins Information Security Institute, 2000. http://www.cs.brown.edu/cgc/stms/papers/hashskip.pdf.
    • (2000) Technical Report
    • Goodrich, M.T.1    Tamassia, R.2
  • 10
    • 84945279475 scopus 로고    scopus 로고
    • An efficient dynamic and distributed cryptographic accumulator
    • Proc. Int. Security Conference (ISC 2002), Springer-Verlag
    • M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In Proc. Int. Security Conference (ISC 2002), volume 2433 of LNCS, pages 372-388. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2433 , pp. 372-388
    • Goodrich, M.T.1    Tamassia, R.2    Hasic, J.3
  • 12
    • 35248831605 scopus 로고    scopus 로고
    • Authenticated data structures for graph and geometric searching
    • Proc. RSA Conference -Cryptographers'Track, Springer
    • M. T. Goodrich, R. Tamassia, N. Triandopoulos, and R. Cohen. Authenticated data structures for graph and geometric searching. In Proc. RSA Conference -Cryptographers'Track, pages 295-313. Springer, LNCS 2612, 2003.
    • (2003) LNCS , vol.2612 , pp. 295-313
    • Goodrich, M.T.1    Tamassia, R.2    Triandopoulos, N.3    Cohen, R.4
  • 13
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Proc. Int. Conf. on Financial Cryptography, Springer-Verlag
    • P. C. Kocher. On certificate revocation and validation. In Proc. Int. Conf. on Financial Cryptography, volume 1465 of LNCS. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1465
    • Kocher, P.C.1
  • 17
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • IEEE Computer Society Press
    • R. C. Merkle. Protocols for public key cryptosystems. In Proc. Symp. on Security and Privacy, pages 122-134. IEEE Computer Society Press, 1980.
    • (1980) Proc. Symp. on Security and Privacy , pp. 122-134
    • Merkle, R.C.1
  • 18
    • 84969346266 scopus 로고
    • A certified digital signature
    • G. Brassard, editor, Proc. CRYPTO '89, Springer-Verlag
    • R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO '89, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 19
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Berkeley
    • M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. 7th USENIX Security Symposium, pages 217-228, Berkeley, 1998.
    • (1998) Proc. 7th USENIX Security Symposium , pp. 217-228
    • Naor, M.1    Nissim, K.2
  • 20
  • 21
    • 33646141285 scopus 로고    scopus 로고
    • Authenticating Web content with prooflets
    • Center for Geometric Computing, Brown University
    • M. Shin, C. Straub, R. Tamassia, and D. J. Polivy. Authenticating Web content with prooflets. Technical report, Center for Geometric Computing, Brown University, 2002. http://www.cs.brown.edu/cgc/stms/papers/prooflets.pdf.
    • (2002) Technical Report
    • Shin, M.1    Straub, C.2    Tamassia, R.3    Polivy, D.J.4
  • 22
    • 35248885485 scopus 로고    scopus 로고
    • On the cost of authenticated data structures
    • Center for Geometric Computing, Brown University
    • R. Tamassia and N. Triandopoulos. On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, 2003. http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf.
    • (2003) Technical Report
    • Tamassia, R.1    Triandopoulos, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.