-
2
-
-
0000758345
-
Proposed federal information processing standard for Digital Signature Standard (DSS)
-
Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, 56(169):42980-42982, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
3
-
-
0344379339
-
-
National Institute of Science and Technology. FIPS 180-2
-
Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-2, 2001.
-
(2001)
Secure Hashing Algorithm
-
-
-
4
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
September
-
J. Bentley. Multidimensional Binary Search Trees Used For Associative Searching. Communications of the ACM, 18(9):509-517, September 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.9
, pp. 509-517
-
-
Bentley, J.1
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proceedings of Advances in Cryptology - EUROCRYPT'03, E. Biham, Ed., Springer-Verlag
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of Advances in Cryptology - EUROCRYPT'03, E. Biham, Ed., LNCS, Springer-Verlag, 2003.
-
(2003)
LNCS
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
2442542018
-
Authentic data publication over the internet
-
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic Data Publication over the Internet. In 14th IFIP 11.3 Working Conference in Database Security, pages 102-112, 2000.
-
(2000)
14th IFIP 11.3 Working Conference in Database Security
, pp. 102-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
7
-
-
84888527471
-
Querying the Internet with PIER
-
R. Huebsch, J. Hellerstein, N. Lanham, B. Loo, S. Shenker, and I. Stoica. Querying the Internet with PIER. In Proceedings of the 29th International Conference on Very Large Databases, pages 321-332, 2003.
-
(2003)
Proceedings of the 29th International Conference on Very Large Databases
, pp. 321-332
-
-
Huebsch, R.1
Hellerstein, J.2
Lanham, N.3
Loo, B.4
Shenker, S.5
Stoica, I.6
-
8
-
-
0036372525
-
Middle-tier database caching for E-business
-
Q. Luo, S. Krishnamurthy, C. Mohan, H. Pirahesh, H. Woo, B. Lindsay, and J. Naughton. Middle-Tier Database Caching for E-Business. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pages 600-611, 2002.
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 600-611
-
-
Luo, Q.1
Krishnamurthy, S.2
Mohan, C.3
Pirahesh, H.4
Woo, H.5
Lindsay, B.6
Naughton, J.7
-
9
-
-
2442588372
-
Apps on the edge
-
May
-
D. Margulius. Apps on the Edge. InfoWorld, 24(21), May 2002. http://www.infoworld.com/article/02/05/23/ 020527feedgetci_1.html.
-
(2002)
InfoWorld
, vol.24
, Issue.21
-
-
Margulius, D.1
-
12
-
-
0028514601
-
An authentication service for computer networks
-
B. Neuman and T. Tso. Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32(9):33-38, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Kerberos, T.Tso.2
-
13
-
-
0021392590
-
The grid file: An adaptable, symmetric multikey file structure
-
March
-
J. Nievergelt, H. Hinterberger, and K. Sevcik. The Grid File: An Adaptable, Symmetric Multikey File Structure. ACM Transactions on Database Systems, 9(1):38-71, March 1984.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.1
, pp. 38-71
-
-
Nievergelt, J.1
Hinterberger, H.2
Sevcik, K.3
-
17
-
-
0345359164
-
StegFS: A steganographic file system
-
Bangalore, India, March
-
H. Pang, K. Tan, and X. Zhou. StegFS: A Steganographic File System. In Proceedings of the 19th International Conference on Data Engineering, pages 657-668, Bangalore, India, March 2003.
-
(2003)
Proceedings of the 19th International Conference on Data Engineering
, pp. 657-668
-
-
Pang, H.1
Tan, K.2
Zhou, X.3
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0021644214
-
The quadtree and related hierarchical data structures
-
June
-
H. Samet. The Quadtree and Related Hierarchical Data Structures. ACM Computing Surveys, 16(2): 187-260, June 1984.
-
(1984)
ACM Computing Surveys
, vol.16
, Issue.2
, pp. 187-260
-
-
Samet, H.1
-
22
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati. Access Control: Principles and Practice. IEEE Communications Magazine, 32(9):40-48, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
23
-
-
84978370407
-
An analysis of internet content delivery systems
-
S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, and H. Levy. An Analysis of Internet Content Delivery Systems. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 315-327, 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 315-327
-
-
Saroiu, S.1
Gummadi, K.2
Dunn, R.3
Gribble, S.4
Levy, H.5
|