메뉴 건너뛰기




Volumn 4127 LNCS, Issue , 2006, Pages 60-73

Authenticating multi-dimensional query results in data publishing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; DATA PROCESSING; DATABASE SYSTEMS; EVALUATION; SECURITY OF DATA; TREES (MATHEMATICS); CHAINS; DATA HANDLING; DECISION TREES; QUERY PROCESSING;

EID: 33746749406     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11805588_5     Document Type: Conference Paper
Times cited : (45)

References (23)
  • 2
    • 0000758345 scopus 로고
    • Proposed federal information processing standard for Digital Signature Standard (DSS)
    • Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, 56(169):42980-42982, 1991.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 3
    • 0344379339 scopus 로고    scopus 로고
    • National Institute of Science and Technology. FIPS 180-2
    • Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-2, 2001.
    • (2001) Secure Hashing Algorithm
  • 4
    • 0016557674 scopus 로고
    • Multidimensional binary search trees used for associative searching
    • September
    • J. Bentley. Multidimensional Binary Search Trees Used For Associative Searching. Communications of the ACM, 18(9):509-517, September 1975.
    • (1975) Communications of the ACM , vol.18 , Issue.9 , pp. 509-517
    • Bentley, J.1
  • 5
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Proceedings of Advances in Cryptology - EUROCRYPT'03, E. Biham, Ed., Springer-Verlag
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of Advances in Cryptology - EUROCRYPT'03, E. Biham, Ed., LNCS, Springer-Verlag, 2003.
    • (2003) LNCS
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 9
    • 2442588372 scopus 로고    scopus 로고
    • Apps on the edge
    • May
    • D. Margulius. Apps on the Edge. InfoWorld, 24(21), May 2002. http://www.infoworld.com/article/02/05/23/ 020527feedgetci_1.html.
    • (2002) InfoWorld , vol.24 , Issue.21
    • Margulius, D.1
  • 12
    • 0028514601 scopus 로고
    • An authentication service for computer networks
    • B. Neuman and T. Tso. Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32(9):33-38, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Kerberos, T.Tso.2
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 21
    • 0021644214 scopus 로고
    • The quadtree and related hierarchical data structures
    • June
    • H. Samet. The Quadtree and Related Hierarchical Data Structures. ACM Computing Surveys, 16(2): 187-260, June 1984.
    • (1984) ACM Computing Surveys , vol.16 , Issue.2 , pp. 187-260
    • Samet, H.1
  • 22
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. Sandhu and P. Samarati. Access Control: Principles and Practice. IEEE Communications Magazine, 32(9):40-48, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.