-
1
-
-
0032628275
-
-
A.M. Ben-Amram, H. Petersen, Backing up in singly linked lists, in: ACM Symposium on Theory of Computing, 1999, pp. 780-786
-
-
-
-
2
-
-
0031632860
-
-
M.A. Bender, A. Fernandez, D. Ron, A. Sahai, S.P. Vadhan, The power of a pebble: Exploring and mapping directed graphs, in: ACM Symposium on Theory of Computing, 1998, pp. 269-278
-
-
-
-
3
-
-
84976813455
-
-
A.K. Chandra, Efficient compilation of linear recursive programs, in: 14th Annual IEEE Symposium on Foundations of Computer Science, 1973, pp. 16-25
-
-
-
-
5
-
-
34248536219
-
-
D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in: Fifth Conference on Financial Cryptography, 2002, pp. 102-119
-
-
-
-
6
-
-
84968735289
-
-
M. Datar, A. Gionis, P. Indyk, R. Motwani, Maintaining stream statistics over sliding windows, in: Proc. of the 13th annual ACM-SIAM symposium on Discrete algorithms, 2002, pp. 635-644
-
-
-
-
7
-
-
33746994112
-
-
M. Furman, Y. Matias, E. Porat, LTS: The List-Traversal Synopses System, in: NGITS, 2006, pp. 353-354
-
-
-
-
8
-
-
0032762085
-
-
P. Gibbons, Y. Matias, Synopsis data structures for massive data sets, in: Proc. of the tenth annual ACM-SIAM symposium on Discrete algorithms, 1999, pp. 909-910
-
-
-
-
10
-
-
84880879872
-
Gene itkis and leonid reyzin and verifying
-
Itkis G., and Reyzin L. Gene itkis and leonid reyzin and verifying. CRYPTO (2001) 332-354
-
(2001)
CRYPTO
, pp. 332-354
-
-
Itkis, G.1
Reyzin, L.2
-
11
-
-
0036352143
-
-
M. Jakobsson, Fractal hash sequence representation and traversal, in: IEEE International Symposium on Information Theory, 2002, p. 437
-
-
-
-
13
-
-
35248842541
-
-
A. Kozlov, L. Reyzin, Forward-secure signatures with fast key update, in: Third Conference on Security in Communication Networks, 2002, pp. 241-256
-
-
-
-
14
-
-
0019634370
-
Password authentification with insecure communication
-
Lamport L. Password authentification with insecure communication. Communications of the ACM 24 11 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
15
-
-
34248504559
-
-
Y. Matias, E. Porat, Efficient pebbling for list traversal synopses, Technical Report, Tel Aviv University, 2001 (revised 2002)
-
-
-
-
16
-
-
35248885103
-
-
Y. Matias, E. Porat, Efficient pebbling for list traversal synopses, in: International Colloquium on Automata, Languages and Programming, 2003, pp. 918-928
-
-
-
-
17
-
-
0035752112
-
-
A. Perrig, The biba one-time signature and broadcast authentication protocol, in: ACM Conference on Computer and Communications Security, 2001, pp. 28-37
-
-
-
-
18
-
-
84968490873
-
-
N. Pippenger, Advances in pebbling, in: International Colloquium on Automata, Languages and Programming, 1982, pp. 407-417
-
-
-
-
19
-
-
34248551613
-
-
R.L. Rivest, A. Shamir, Payword and micromint: Two simple micropayment schemes, in: Security Protocols Workshop, 1996, pp. 69-87
-
-
-
-
20
-
-
0001361340
-
An efficient machineindependent procedure for garbage collection in various list structures
-
Schorr H., and Waite W.M. An efficient machineindependent procedure for garbage collection in various list structures. Communications of the ACM 10 8 (1967) 501-506
-
(1967)
Communications of the ACM
, vol.10
, Issue.8
, pp. 501-506
-
-
Schorr, H.1
Waite, W.M.2
-
21
-
-
35248833199
-
On the computation-storage trade-offs of hash chain traversal
-
Sella Y. On the computation-storage trade-offs of hash chain traversal. Financial Cryptography (2003) 270-285
-
(2003)
Financial Cryptography
, pp. 270-285
-
-
Sella, Y.1
-
22
-
-
34248534206
-
Fast and read-only algorithms for traversing trees without an auxiliary stack
-
Siklossy L. Fast and read-only algorithms for traversing trees without an auxiliary stack. Information Processing Letters 1 (1972) 149-152
-
(1972)
Information Processing Letters
, vol.1
, pp. 149-152
-
-
Siklossy, L.1
-
23
-
-
17244362429
-
-
J. Sobel, D.P. Friedman, Recycling continuations, ACM SIGPLAN International Conference on Functional Programming 34 (1) (1999) 251-260
-
-
-
-
24
-
-
35048813651
-
Merkle tree traversal in log space and time
-
Szydlo M. Merkle tree traversal in log space and time. Eurocrypt (2004) 541-554
-
(2004)
Eurocrypt
, pp. 541-554
-
-
Szydlo, M.1
|