-
1
-
-
0019575397
-
Concurrency control in districuted database systems
-
June
-
P. Bernstein and N. Goodman. Concurrency control in districuted database systems. In ACM Computing Surveys, Volume 13(2), pages 185-221, June 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.2
, pp. 185-221
-
-
Bernstein, P.1
Goodman, N.2
-
2
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
(E. Biham, ed.), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-verlag. Berlin, Germany
-
D.Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps, in Advances in Cryptology - EUROCRYPT'2003 (E. Biham, ed.), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-verlag. Berlin, Germany, 2003
-
(2003)
Advances in Cryptology - EUROCRYPT'2003
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
0035748036
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls and G. Stubblebine. Flexible authentication of XML documents. Proc. of the 8th ACM conference on Computer and Communication Security, pp. 136-145, 2001.
-
(2001)
Proc. of the 8th ACM Conference on Computer and Communication Security
, pp. 136-145
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, G.6
-
7
-
-
2442542018
-
Authentic data publication over the internet
-
P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. Authentic data publication over the internet. In 14th UFIP 11.3 Working Conference in Database Security, Pages 102-112, 2002.
-
(2002)
14th UFIP 11.3 Working Conference in Database Security
, pp. 102-112
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Stubblebine, S.4
-
8
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an Authenticated Dictionary with Skip Lists and Commutative Hashing. Proc. of DISCEX II'01, Vol. 2, pp. 1068-1083, 2001.
-
(2001)
Proc. of DISCEX II'01
, vol.2
, pp. 1068-1083
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
9
-
-
84969346266
-
A certified digital signature
-
Lecture Notes on Computer Science, Spriner-Verlag
-
R. C. Merkle. A certified digital signature. Proc. of Advances in Cryptology-Crypto '89, Lecture Notes on Computer Science, Vol. 0435, pp. 218-238, Spriner-Verlag, 1989.
-
(1989)
Proc. of Advances in Cryptology-crypto '89
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
10
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
Feb.
-
E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases. NDSS 2004, Feb. 2004.
-
(2004)
NDSS 2004
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
12
-
-
2442590644
-
Autehticating query results in edge computing
-
Mar.
-
H.H. Pang, K.L. Tan. Autehticating query results in edge computing. ICDE 2004, Mar. 2004.
-
(2004)
ICDE 2004
-
-
Pang, H.H.1
Tan, K.L.2
-
13
-
-
84979076059
-
PayWord and microMint-two simple micropayment schemes
-
(ed. Mark Lomas), Lecture Notes in Computer Science No. 1189, Springer
-
R. Rivest and A. Shamir. PayWord and MicroMint-Two Simple Micropayment Schemes in Proceedings of 1996 International Workshop on Security Protocols, (ed. Mark Lomas), Lecture Notes in Computer Science No. 1189, pages 69-87. Springer, 1997.
-
(1997)
Proceedings of 1996 International Workshop on Security Protocols
, pp. 69-87
-
-
Rivest, R.1
Shamir, A.2
|