메뉴 건너뛰기




Volumn 4861 LNCS, Issue , 2007, Pages 1-15

Time and space efficient algorithms for two-party authenticated data structures

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; AUTHENTICATION; DATABASE SYSTEMS; INFORMATION MANAGEMENT; QUERY PROCESSING; SERVERS;

EID: 38149124777     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77048-0_1     Document Type: Conference Paper
Times cited : (66)

References (21)
  • 1
    • 21044449695 scopus 로고    scopus 로고
    • Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
    • Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
  • 4
    • 21144440101 scopus 로고    scopus 로고
    • Goodrich, M.T., Shin, M., Tamassia, R., Winsborough, W.H.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, pp. 332-347. Springer, Heidelberg (2003)
    • Goodrich, M.T., Shin, M., Tamassia, R., Winsborough, W.H.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 332-347. Springer, Heidelberg (2003)
  • 5
    • 84964426510 scopus 로고    scopus 로고
    • Implementation of an authenticated dictionary with skip lists and commutative hashing
    • IEEE Computer Society Press, Los Alamitos
    • Goodrich, M.T., Tamassia, R.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proc. DARPA Information Survivability Conference & Exposition II (DISCEX II), pp. 68-82. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proc. DARPA Information Survivability Conference & Exposition II (DISCEX II) , pp. 68-82
    • Goodrich, M.T.1    Tamassia, R.2
  • 6
    • 84945279475 scopus 로고    scopus 로고
    • Goodrich, M.T., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, 2433, pp. 372-388. Springer, Heidelberg (2002)
    • Goodrich, M.T., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372-388. Springer, Heidelberg (2002)
  • 7
    • 35248831605 scopus 로고    scopus 로고
    • Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 295-313. Springer, Heidelberg (2003)
    • Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295-313. Springer, Heidelberg (2003)
  • 13
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 14
    • 33744927171 scopus 로고    scopus 로고
    • Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: Grumbach, S., Sui, L., Vianu, V. (eds.) ASIAN 2005. LNCS, 3818, pp. 28-48. Springer, Heidelberg (2005)
    • Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: Grumbach, S., Sui, L., Vianu, V. (eds.) ASIAN 2005. LNCS, vol. 3818, pp. 28-48. Springer, Heidelberg (2005)
  • 17
    • 38149124657 scopus 로고    scopus 로고
    • Integrity checking in cryprographic file systems with constant trusted storage
    • USENIX, pp
    • Oprea, A., Reiter, M.K.: Integrity checking in cryprographic file systems with constant trusted storage. In: Proc. USENIX Security Symposium (USENIX), pp. 183-198 (2007)
    • (2007) Proc. USENIX Security Symposium , pp. 183-198
    • Oprea, A.1    Reiter, M.K.2
  • 18
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668-676 (1990)
    • (1990) Commun. ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 19
    • 0142246303 scopus 로고    scopus 로고
    • Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, 2832, pp. 2-5. Springer, Heidelberg (2003)
    • Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2-5. Springer, Heidelberg (2003)
  • 20
    • 38149014557 scopus 로고    scopus 로고
    • Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, Available (2003), from http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf
    • Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, Available (2003), from http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf
  • 21
    • 26444561838 scopus 로고    scopus 로고
    • Computational bounds on hierarchical data processing with applications to information security
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 153-165. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 153-165
    • Tamassia, R.1    Triandopoulos, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.