-
2
-
-
0017690595
-
Concurrency of operations on b-trees
-
R. Bayer and M. Schkolnick. Concurrency of operations on b-trees. In Acta Informatica, volume 9(1), pages 173-189, 1977.
-
(1977)
Acta Informatica
, vol.9
, Issue.1
, pp. 173-189
-
-
Bayer, R.1
Schkolnick, M.2
-
3
-
-
0019575397
-
Concurrency control in distributed database systems
-
June
-
P. Bernstein and N. Goodman. Concurrency control in distributed database systems. In ACM Computing Surveys, volume 13(2), pages 185-221, June 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.2
, pp. 185-221
-
-
Bernstein, P.1
Goodman, N.2
-
4
-
-
0035748036
-
Flexible authentication of xml documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and G. Stubblebine. Flexible authentication of xml documents. In Proceedings of the 8th ACM Conference on Computer and Communications Security, pages 136-145, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 136-145
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, G.6
-
5
-
-
2442542018
-
Authentic data publication over the internet
-
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic data publication over the internet. In 14th IFIP 11.3 Working Conference in Database Security, pages 102-112, 2000.
-
(2000)
14th IFIP 11.3 Working Conference in Database Security
, pp. 102-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
6
-
-
0016092372
-
A user authentication system not requiring secrecy in the computer
-
August
-
A. Evans, W. Kantrowitz, and E. Weiss. A user authentication system not requiring secrecy in the computer. In Communications of the ACM, volume 17(8), pages 437-442, August 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.1
Kantrowitz, W.2
Weiss, E.3
-
7
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DARPA Information Survivability Conference and Exposition (DISCEX II), volume 2, pages 1068-1084, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.2
, pp. 1068-1084
-
-
Goodrich, M.1
Tamassia, R.2
Schwerin, A.3
-
8
-
-
0003308762
-
Internet x.509 public key infrastructure certificate and crl profile
-
R. Housley, W. Ford, W. Polk, and D. Solo. Internet x.509 public key infrastructure certificate and crl profile. In RFC 2459, 1999.
-
(1999)
RFC
, vol.2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
10
-
-
2442588372
-
Apps on the edge
-
May
-
D. Margulius. Apps on the edge. InfoWorld, 24(21), May 2002. http://www.infoworld.com/article/02/05/23/020527feedgetci_l.html.
-
(2002)
InfoWorld
, vol.24
, Issue.21
-
-
Margulius, D.1
-
14
-
-
2442450133
-
Rfc 1321: The md5 message-digest algorithm
-
April
-
R. Rivest. Rfc 1321: The md5 message-digest algorithm. Internet Activities Board, April 1992.
-
(1992)
Internet Activities Board
-
-
Rivest, R.1
-
15
-
-
84979076059
-
PayWord and MicroMint: Two simple micropayment schemes
-
(This version is dated 2001). An earlier version appears in Security Protocols
-
R. Rivest and A. Shamir. PayWord and MicroMint: Two simple micropayment schemes. In http://theory.lcs.mit.edu/rivest/RivestShamir-mpay.pdf (This version is dated 2001). An earlier version appears in Security Protocols, Lecture Notes in Computer Science, LNCS 1189, pp. 69-87, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.LNCS 1189
, pp. 69-87
-
-
Rivest, R.1
Shamir, A.2
-
16
-
-
33846436953
-
Undeniable replies for database queries
-
M. Roos, A. Buldas, and J. Willemson. Undeniable replies for database queries. In Proceedings of the Baltic Conference, BalticDB&IS, pages 215-226, 2002.
-
(2002)
Proceedings of the Baltic Conference, BalticDB&IS
, pp. 215-226
-
-
Roos, M.1
Buldas, A.2
Willemson, J.3
|