메뉴 건너뛰기




Volumn 4721 LNCS, Issue , 2007, Pages 47-63

Authenticating kNN query results in data publishing

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; DATA STRUCTURES; PUBLISHING;

EID: 38049082193     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75248-6_4     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 2
    • 0000758345 scopus 로고
    • Proposed Federal Information Processing Standard for Digital Signature Standard DSS
    • Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register 56(169), 42980-42982 (1991)
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 3
    • 38049040396 scopus 로고    scopus 로고
    • Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-182 (2001)
    • Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180-182 (2001)
  • 4
    • 0025447750 scopus 로고
    • The r*-tree: An efficient and robust access method for points and rectangles
    • Beckmann, N., Kriegel, H., Schneider, R., Seeger, B.: The r*-tree: An efficient and robust access method for points and rectangles. In: SIGMOD Conference, pp. 322-331 (1990)
    • (1990) SIGMOD Conference , pp. 322-331
    • Beckmann, N.1    Kriegel, H.2    Schneider, R.3    Seeger, B.4
  • 5
    • 33746749406 scopus 로고    scopus 로고
    • Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), pp. 60-73 (2006)
    • Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), pp. 60-73 (2006)
  • 6
    • 38049045143 scopus 로고    scopus 로고
    • Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication over the Internet. In: 14th IFIP 11.3 Working Conference in Database Security, pp. 102-112 (2000)
    • Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication over the Internet. In: 14th IFIP 11.3 Working Conference in Database Security, pp. 102-112 (2000)
  • 9
    • 2442588372 scopus 로고    scopus 로고
    • Apps. on the Edge
    • May
    • Margulius, D.: Apps. on the Edge. InfoWorld, 24(21), (May 2002), http://www.infoworld.com/article/02/05/23/020527feedgetci_1.html
    • (2002) InfoWorld , vol.24 , Issue.21
    • Margulius, D.1
  • 12
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • Neuman, B., Tso, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine 32(9), 33-38 (1994)
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Tso, T.2
  • 14
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating Query Results in Edge Computing
    • IEEE Computer Society Press, Los Alamitos
    • Pang, H., Tan, K.: Authenticating Query Results in Edge Computing. In: Conference on Data Engineering, pp. 560-571. IEEE Computer Society Press, Los Alamitos (2004)
    • (2004) Conference on Data Engineering , pp. 560-571
    • Pang, H.1    Tan, K.2
  • 16
    • 2442450133 scopus 로고
    • RFC 1321: The MD5 Message-Digest Algorithm
    • Rivest, R.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (1992)
    • (1992) Internet Activities Board
    • Rivest, R.1
  • 17
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 18
    • 0028513932 scopus 로고
    • Access Control: Principles and Practice
    • Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications Magazine 32(9), 40-48 (1994)
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.