-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Proc. Information Security Conference (ISC 2001), Springer-Verlag
-
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379-393. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2200
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
3
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proc. CRYPTO, 2002.
-
(2002)
Proc. CRYPTO
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
4
-
-
0035748036
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, G. Martel, G. Nuckolls, and S. Stubblebine. Flexible authentication of XML documents. In Proc. ACM Conference on Computer and Communications Security, 2001.
-
(2001)
Proc. ACM Conference on Computer and Communications Security
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, G.4
Nuckolls, G.5
Stubblebine, S.6
-
6
-
-
84957806727
-
Efficient and fresh certification
-
Int. Workshop on Practice and Theory in Public Key Cryptography (PKC '2000), Springer-Verlag
-
I. Gassko, P. S. Gemmell, and P. MacKenzie. Efficient and fresh certification. In Int. Workshop on Practice and Theory in Public Key Cryptography (PKC '2000), volume 1751 of LNCS, pages 342-353. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 342-353
-
-
Gassko, I.1
Gemmell, P.S.2
MacKenzie, P.3
-
7
-
-
35248897874
-
Design and implementation of a distributed authenticated dictionary and its applications
-
Center for Geometric Computing, Brown University
-
M. T. Goodrich, J. Lentini, M. Shin, R. Tamassia, and R. Cohen. Design and implementation of a distributed authenticated dictionary and its applications. Technical report, Center for Geometric Computing, Brown University, 2002. http://www.cs.brown.edu/cgc/stms/papers/stms.pdf.
-
(2002)
Technical Report
-
-
Goodrich, M.T.1
Lentini, J.2
Shin, M.3
Tamassia, R.4
Cohen, R.5
-
8
-
-
21144440101
-
Authenticated dictionaries for fresh attribute credentials
-
Proc. Trust Management Conference, Springer
-
M. T. Goodrich, M. Shin, R. Tamassia, and W. H. Winsborough. Authenticated dictionaries for fresh attribute credentials. In Proc. Trust Management Conference, volume 2692 of LNCS, pages 332-347. Springer, 2003.
-
(2003)
LNCS
, vol.2692
, pp. 332-347
-
-
Goodrich, M.T.1
Shin, M.2
Tamassia, R.3
Winsborough, W.H.4
-
9
-
-
0141873829
-
Efficient authenticated dictionaries with skip lists and commutative hashing
-
Johns Hopkins Information Security Institute
-
M. T. Goodrich and R. Tamassia. Efficient authenticated dictionaries with skip lists and commutative hashing. Technical report, Johns Hopkins Information Security Institute, 2000. http://www.cs.brown.edu/cgc/stms/papers/hashskip.pdf.
-
(2000)
Technical Report
-
-
Goodrich, M.T.1
Tamassia, R.2
-
10
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
Proc. Int. Security Conference (ISC 2002), Springer-Verlag
-
M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In Proc. Int. Security Conference (ISC 2002), volume 2433 of LNCS, pages 372-388. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 372-388
-
-
Goodrich, M.T.1
Tamassia, R.2
Hasic, J.3
-
12
-
-
35248831605
-
Authenticated data structures for graph and geometric searching
-
Proc. RSA Conference -Cryptographers'Track, Springer
-
M. T. Goodrich, R. Tamassia, N. Triandopoulos, and R. Cohen. Authenticated data structures for graph and geometric searching. In Proc. RSA Conference -Cryptographers'Track, pages 295-313. Springer, LNCS 2612, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 295-313
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
13
-
-
84958063551
-
On certificate revocation and validation
-
Proc. Int. Conf. on Financial Cryptography, Springer-Verlag
-
P. C. Kocher. On certificate revocation and validation. In Proc. Int. Conf. on Financial Cryptography, volume 1465 of LNCS. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1465
-
-
Kocher, P.C.1
-
16
-
-
35248820993
-
-
G. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authentic data publication, 2001. http://www.cs.ucdavis.edu/~devanbu/files/model-paper.pdf.
-
(2001)
A General Model for Authentic Data Publication
-
-
Martel, G.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
17
-
-
84920380941
-
Protocols for public key cryptosystems
-
IEEE Computer Society Press
-
R. C. Merkle. Protocols for public key cryptosystems. In Proc. Symp. on Security and Privacy, pages 122-134. IEEE Computer Society Press, 1980.
-
(1980)
Proc. Symp. on Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
18
-
-
84969346266
-
A certified digital signature
-
G. Brassard, editor, Proc. CRYPTO '89, Springer-Verlag
-
R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO '89, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
85084162561
-
Certificate revocation and certificate update
-
Berkeley
-
M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. 7th USENIX Security Symposium, pages 217-228, Berkeley, 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
21
-
-
33646141285
-
Authenticating Web content with prooflets
-
Center for Geometric Computing, Brown University
-
M. Shin, C. Straub, R. Tamassia, and D. J. Polivy. Authenticating Web content with prooflets. Technical report, Center for Geometric Computing, Brown University, 2002. http://www.cs.brown.edu/cgc/stms/papers/prooflets.pdf.
-
(2002)
Technical Report
-
-
Shin, M.1
Straub, C.2
Tamassia, R.3
Polivy, D.J.4
-
22
-
-
35248885485
-
On the cost of authenticated data structures
-
Center for Geometric Computing, Brown University
-
R. Tamassia and N. Triandopoulos. On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, 2003. http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf.
-
(2003)
Technical Report
-
-
Tamassia, R.1
Triandopoulos, N.2
|