-
1
-
-
84957678021
-
Fast digital identity revocation
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
-
2
-
-
21044449695
-
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
-
-
-
-
3
-
-
84964516138
-
The science archive for the Sloan Digital Sky Survey
-
Brunner, R.J., Csabai, L., Szalay, A.S., Connolly, A., Szokoly, G.P., Ramaiyer, K.: The science archive for the Sloan Digital Sky Survey. In: Proc. Astronomical Data Analysis Software and Systems Conference V (1996)
-
(1996)
Proc. Astronomical Data Analysis Software and Systems Conference
, vol.5
-
-
Brunner, R.J.1
Csabai, L.2
Szalay, A.S.3
Connolly, A.4
Szokoly, G.P.5
Ramaiyer, K.6
-
4
-
-
0036312254
-
Eliminating counterevidence with applications to accountable certificate management
-
Buldas, A., Laud, P., Lipmaa, H.: Eliminating counterevidence with applications to accountable certificate management. Journal of Computer Security 10(3), 273-296 (2002)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 273-296
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
5
-
-
0038274733
-
Authentic data publication over the Internet
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the Internet. Journal of Computer Security 11(3), 291-314 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
6
-
-
0347010591
-
Making data structures persistent
-
Driscoll, J.R., Sarnak, N., Sleator, S., Tarjan, R.E.: Making data structures persistent. In: Proc. ACM Sympos. on the Theory of Computing, pp. 109-121 (1986)
-
(1986)
Proc. ACM Sympos. on the Theory of Computing
, pp. 109-121
-
-
Driscoll, J.R.1
Sarnak, N.2
Sleator, S.3
Tarjan, R.E.4
-
7
-
-
84957806727
-
-
Gassko, I., Gemmell, P.S., MacKenzie, P.: Efficient and fresh certification. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 342-353. Springer, Heidelberg (2000)
-
Gassko, I., Gemmell, P.S., MacKenzie, P.: Efficient and fresh certification. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 342-353. Springer, Heidelberg (2000)
-
-
-
-
10
-
-
35248831605
-
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 295-313. Springer, Heidelberg (2003)
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295-313. Springer, Heidelberg (2003)
-
-
-
-
12
-
-
85015226904
-
-
Hanson, E.N.: The interval skip list: a data structure for finding all intervals that overlap a point. In: Dehne, F., Sack, J.-R., Santoro, N. (eds.) WADS 1991. LNCS, 519, pp. 153-164. Springer, Heidelberg (1991)
-
Hanson, E.N.: The interval skip list: a data structure for finding all intervals that overlap a point. In: Dehne, F., Sack, J.-R., Santoro, N. (eds.) WADS 1991. LNCS, vol. 519, pp. 153-164. Springer, Heidelberg (1991)
-
-
-
-
13
-
-
0027148657
-
Mapping the genome: Some combinatorial problems arising in molecular biology
-
Karp, R.M.: Mapping the genome: Some combinatorial problems arising in molecular biology. In: Proc. ACM Symp. on the Theory of Computing, pp. 278-285 (1993)
-
(1993)
Proc. ACM Symp. on the Theory of Computing
, pp. 278-285
-
-
Karp, R.M.1
-
14
-
-
37149006624
-
-
Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs 1995
-
Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs (1995)
-
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
17
-
-
0042309639
-
Data collection for the Sloan Digital Sky Survey - A network-flow heuristic
-
Lupton, R., Maley, F.M., Young, N.: Data collection for the Sloan Digital Sky Survey - A network-flow heuristic. Journal of Algorithms 27(2), 339-356 (1998)
-
(1998)
Journal of Algorithms
, vol.27
, Issue.2
, pp. 339-356
-
-
Lupton, R.1
Maley, F.M.2
Young, N.3
-
18
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, C., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39(1), 21-41 (2004)
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, C.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
19
-
-
84858483493
-
-
Mehlhorn, K., Näher, S.: LEDA: A Platform for Combinatorial and Geometric Computing. Cambridge University Press, Cambridge (2000)
-
Mehlhorn, K., Näher, S.: LEDA: A Platform for Combinatorial and Geometric Computing. Cambridge University Press, Cambridge (2000)
-
-
-
-
20
-
-
0004179384
-
Efficient certificate revocation
-
Technical Report TM-542b, MIT Laboratory for Computer Science
-
Micali, S.: Efficient certificate revocation. Technical Report TM-542b, MIT Laboratory for Computer Science (1996)
-
(1996)
-
-
Micali, S.1
-
21
-
-
85084162561
-
Certificate revocation and certificate update
-
Berkeley pp
-
Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proc. 7th USENIX Security Symposium, Berkeley pp. 217-228 (1998)
-
(1998)
Proc. 7th USENIX Security Symposium
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
22
-
-
26444554946
-
-
Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec, pp. 84-98 (2005)
-
Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec, pp. 84-98 (2005)
-
-
-
-
24
-
-
0013410503
-
Average search and update costs in skip lists
-
Papadakis, T., Munro, J.I., Poblete, P.V.: Average search and update costs in skip lists. BIT 32, 316-332 (1992)
-
(1992)
BIT
, vol.32
, pp. 316-332
-
-
Papadakis, T.1
Munro, J.I.2
Poblete, P.V.3
-
25
-
-
84947776512
-
-
Poblete, P.V., Munro, J.I., Papadakis, T.: The binomial transform and its application to the analysis of skip lists. In: Spirakis, P.G. (ed.) ESA 1995. LNCS, 979, pp. 554-569. Springer, Heidelberg (1995)
-
Poblete, P.V., Munro, J.I., Papadakis, T.: The binomial transform and its application to the analysis of skip lists. In: Spirakis, P.G. (ed.) ESA 1995. LNCS, vol. 979, pp. 554-569. Springer, Heidelberg (1995)
-
-
-
-
26
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668-676 (1990)
-
(1990)
Commun. ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
27
-
-
0142246303
-
-
Tamassia, R.: Authenticated data structures. In: Di Battista, C., Zwick, U. (eds.) ESA 2003. LNCS, 2832, pp. 2-5. Springer, Heidelberg (2003)
-
Tamassia, R.: Authenticated data structures. In: Di Battista, C., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2-5. Springer, Heidelberg (2003)
-
-
-
-
28
-
-
26444561838
-
Computational bounds on hierarchical data processing with applications to information security
-
Caires, L, Italiano, C.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: Caires, L., Italiano, C.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 153-165. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 153-165
-
-
Tamassia, R.1
Triandopoulos, N.2
|