메뉴 건너뛰기




Volumn 4525 LNCS, Issue , 2007, Pages 94-107

On the cost of persistence and authentication in skip lists

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DECISION THEORY; VIRTUAL REALITY;

EID: 37149025723     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72845-0_8     Document Type: Conference Paper
Times cited : (17)

References (28)
  • 1
    • 84957678021 scopus 로고    scopus 로고
    • Fast digital identity revocation
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462
    • Aiello, W.1    Lodha, S.2    Ostrovsky, R.3
  • 2
    • 21044449695 scopus 로고    scopus 로고
    • Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
    • Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
  • 4
    • 0036312254 scopus 로고    scopus 로고
    • Eliminating counterevidence with applications to accountable certificate management
    • Buldas, A., Laud, P., Lipmaa, H.: Eliminating counterevidence with applications to accountable certificate management. Journal of Computer Security 10(3), 273-296 (2002)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 273-296
    • Buldas, A.1    Laud, P.2    Lipmaa, H.3
  • 7
    • 84957806727 scopus 로고    scopus 로고
    • Gassko, I., Gemmell, P.S., MacKenzie, P.: Efficient and fresh certification. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 342-353. Springer, Heidelberg (2000)
    • Gassko, I., Gemmell, P.S., MacKenzie, P.: Efficient and fresh certification. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 342-353. Springer, Heidelberg (2000)
  • 10
    • 35248831605 scopus 로고    scopus 로고
    • Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 295-313. Springer, Heidelberg (2003)
    • Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295-313. Springer, Heidelberg (2003)
  • 12
    • 85015226904 scopus 로고    scopus 로고
    • Hanson, E.N.: The interval skip list: a data structure for finding all intervals that overlap a point. In: Dehne, F., Sack, J.-R., Santoro, N. (eds.) WADS 1991. LNCS, 519, pp. 153-164. Springer, Heidelberg (1991)
    • Hanson, E.N.: The interval skip list: a data structure for finding all intervals that overlap a point. In: Dehne, F., Sack, J.-R., Santoro, N. (eds.) WADS 1991. LNCS, vol. 519, pp. 153-164. Springer, Heidelberg (1991)
  • 13
    • 0027148657 scopus 로고
    • Mapping the genome: Some combinatorial problems arising in molecular biology
    • Karp, R.M.: Mapping the genome: Some combinatorial problems arising in molecular biology. In: Proc. ACM Symp. on the Theory of Computing, pp. 278-285 (1993)
    • (1993) Proc. ACM Symp. on the Theory of Computing , pp. 278-285
    • Karp, R.M.1
  • 14
    • 37149006624 scopus 로고    scopus 로고
    • Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs 1995
    • Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs (1995)
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 15
  • 17
    • 0042309639 scopus 로고    scopus 로고
    • Data collection for the Sloan Digital Sky Survey - A network-flow heuristic
    • Lupton, R., Maley, F.M., Young, N.: Data collection for the Sloan Digital Sky Survey - A network-flow heuristic. Journal of Algorithms 27(2), 339-356 (1998)
    • (1998) Journal of Algorithms , vol.27 , Issue.2 , pp. 339-356
    • Lupton, R.1    Maley, F.M.2    Young, N.3
  • 19
    • 84858483493 scopus 로고    scopus 로고
    • Mehlhorn, K., Näher, S.: LEDA: A Platform for Combinatorial and Geometric Computing. Cambridge University Press, Cambridge (2000)
    • Mehlhorn, K., Näher, S.: LEDA: A Platform for Combinatorial and Geometric Computing. Cambridge University Press, Cambridge (2000)
  • 20
    • 0004179384 scopus 로고    scopus 로고
    • Efficient certificate revocation
    • Technical Report TM-542b, MIT Laboratory for Computer Science
    • Micali, S.: Efficient certificate revocation. Technical Report TM-542b, MIT Laboratory for Computer Science (1996)
    • (1996)
    • Micali, S.1
  • 21
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Berkeley pp
    • Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proc. 7th USENIX Security Symposium, Berkeley pp. 217-228 (1998)
    • (1998) Proc. 7th USENIX Security Symposium , pp. 217-228
    • Naor, M.1    Nissim, K.2
  • 22
    • 26444554946 scopus 로고    scopus 로고
    • Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec, pp. 84-98 (2005)
    • Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec, pp. 84-98 (2005)
  • 24
    • 0013410503 scopus 로고
    • Average search and update costs in skip lists
    • Papadakis, T., Munro, J.I., Poblete, P.V.: Average search and update costs in skip lists. BIT 32, 316-332 (1992)
    • (1992) BIT , vol.32 , pp. 316-332
    • Papadakis, T.1    Munro, J.I.2    Poblete, P.V.3
  • 25
    • 84947776512 scopus 로고    scopus 로고
    • Poblete, P.V., Munro, J.I., Papadakis, T.: The binomial transform and its application to the analysis of skip lists. In: Spirakis, P.G. (ed.) ESA 1995. LNCS, 979, pp. 554-569. Springer, Heidelberg (1995)
    • Poblete, P.V., Munro, J.I., Papadakis, T.: The binomial transform and its application to the analysis of skip lists. In: Spirakis, P.G. (ed.) ESA 1995. LNCS, vol. 979, pp. 554-569. Springer, Heidelberg (1995)
  • 26
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668-676 (1990)
    • (1990) Commun. ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 27
    • 0142246303 scopus 로고    scopus 로고
    • Tamassia, R.: Authenticated data structures. In: Di Battista, C., Zwick, U. (eds.) ESA 2003. LNCS, 2832, pp. 2-5. Springer, Heidelberg (2003)
    • Tamassia, R.: Authenticated data structures. In: Di Battista, C., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2-5. Springer, Heidelberg (2003)
  • 28
    • 26444561838 scopus 로고    scopus 로고
    • Computational bounds on hierarchical data processing with applications to information security
    • Caires, L, Italiano, C.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: Caires, L., Italiano, C.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 153-165. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 153-165
    • Tamassia, R.1    Triandopoulos, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.