-
2
-
-
0000758345
-
-
Proposed Federal Information Processing Standard for Digital Signature Standard DSS
-
Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register 56(169), 42980-42982 (1991)
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
3
-
-
38049040396
-
-
Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-182 (2001)
-
Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-182 (2001)
-
-
-
-
4
-
-
0025447750
-
The r*-tree: An efficient and robust access method for points and rectangles
-
Beckmann, N., Kriegel, H., Schneider, R., Seeger, B.: The r*-tree: An efficient and robust access method for points and rectangles. In: SIGMOD Conference, pp. 322-331 (1990)
-
(1990)
SIGMOD Conference
, pp. 322-331
-
-
Beckmann, N.1
Kriegel, H.2
Schneider, R.3
Seeger, B.4
-
5
-
-
33746749406
-
-
Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), pp. 60-73 (2006)
-
Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), pp. 60-73 (2006)
-
-
-
-
6
-
-
38049045143
-
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication over the Internet. In: 14th IFIP 11.3 Working Conference in Database Security, pp. 102-112 (2000)
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication over the Internet. In: 14th IFIP 11.3 Working Conference in Database Security, pp. 102-112 (2000)
-
-
-
-
7
-
-
84888527471
-
Querying the Internet with PIER
-
Huebsch, R., Hellerstein, J., Lanham, N., Loo, B., Shenker, S., Stoica, I.: Querying the Internet with PIER. In: Proceedings of the 29th International Conference on Very Large Databases, pp. 321-332 (2003)
-
(2003)
Proceedings of the 29th International Conference on Very Large Databases
, pp. 321-332
-
-
Huebsch, R.1
Hellerstein, J.2
Lanham, N.3
Loo, B.4
Shenker, S.5
Stoica, I.6
-
8
-
-
0036372525
-
Middle-Tier Database Caching for E-Business
-
ACM Press, New York
-
Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B., Naughton, J.: Middle-Tier Database Caching for E-Business. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 600-611. ACM Press, New York (2002)
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 600-611
-
-
Luo, Q.1
Krishnamurthy, S.2
Mohan, C.3
Pirahesh, H.4
Woo, H.5
Lindsay, B.6
Naughton, J.7
-
9
-
-
2442588372
-
Apps. on the Edge
-
May
-
Margulius, D.: Apps. on the Edge. InfoWorld, 24(21), (May 2002), http://www.infoworld.com/article/02/05/23/020527feedgetci_1.html
-
(2002)
InfoWorld
, vol.24
, Issue.21
-
-
Margulius, D.1
-
12
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
Neuman, B., Tso, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine 32(9), 33-38 (1994)
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Tso, T.2
-
13
-
-
29844457793
-
Verifying Completeness of Relational Query Results in Data Publishing
-
ACM Press, New York
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying Completeness of Relational Query Results in Data Publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, ACM Press, New York (2005)
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
14
-
-
2442590644
-
Authenticating Query Results in Edge Computing
-
IEEE Computer Society Press, Los Alamitos
-
Pang, H., Tan, K.: Authenticating Query Results in Edge Computing. In: Conference on Data Engineering, pp. 560-571. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Conference on Data Engineering
, pp. 560-571
-
-
Pang, H.1
Tan, K.2
-
15
-
-
0345359164
-
StegFS: A Steganographic File System
-
Bangalore, India, pp, March
-
Pang, H., Tan, K., Zhou, X.: StegFS: A Steganographic File System. In: Proceedings of the 19th International Conference on Data Engineering, Bangalore, India, pp. 657-668 (March 2003)
-
(2003)
Proceedings of the 19th International Conference on Data Engineering
, pp. 657-668
-
-
Pang, H.1
Tan, K.2
Zhou, X.3
-
16
-
-
2442450133
-
RFC 1321: The MD5 Message-Digest Algorithm
-
Rivest, R.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (1992)
-
(1992)
Internet Activities Board
-
-
Rivest, R.1
-
17
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
19
-
-
84978370407
-
An Analysis of Internet Content Delivery Systems
-
Saroiu, S., Gummadi, K., Dunn, R., Gribble, S., Levy, H.: An Analysis of Internet Content Delivery Systems. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp. 315-327 (2002)
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 315-327
-
-
Saroiu, S.1
Gummadi, K.2
Dunn, R.3
Gribble, S.4
Levy, H.5
-
20
-
-
84944319598
-
Indexing the distance: An efficient method to knn processing
-
Yu, C., Ooi, B., Tan, K., Jagadish, H.: Indexing the distance: An efficient method to knn processing. In: Proceedings of the 27th International Conference on Very Large Databases, pp. 421-430 (2001)
-
(2001)
Proceedings of the 27th International Conference on Very Large Databases
, pp. 421-430
-
-
Yu, C.1
Ooi, B.2
Tan, K.3
Jagadish, H.4
|