-
1
-
-
21044449695
-
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
-
-
-
-
3
-
-
37149025723
-
On the cost of persistence and authentication in skip lists
-
Goodrich, M.T., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Proc. Int. Workshop on Experimental Algorithms (WEA), pp. 94-107 (2007)
-
(2007)
Proc. Int. Workshop on Experimental Algorithms (WEA)
, pp. 94-107
-
-
Goodrich, M.T.1
Papamanthou, C.2
Tamassia, R.3
-
4
-
-
21144440101
-
-
Goodrich, M.T., Shin, M., Tamassia, R., Winsborough, W.H.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, pp. 332-347. Springer, Heidelberg (2003)
-
Goodrich, M.T., Shin, M., Tamassia, R., Winsborough, W.H.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 332-347. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
IEEE Computer Society Press, Los Alamitos
-
Goodrich, M.T., Tamassia, R.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proc. DARPA Information Survivability Conference & Exposition II (DISCEX II), pp. 68-82. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proc. DARPA Information Survivability Conference & Exposition II (DISCEX II)
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
-
6
-
-
84945279475
-
-
Goodrich, M.T., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, 2433, pp. 372-388. Springer, Heidelberg (2002)
-
Goodrich, M.T., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372-388. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
35248831605
-
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 295-313. Springer, Heidelberg (2003)
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295-313. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. Int. Conference on Management of Data (SIGMOD), pp. 216-227 (2002)
-
(2002)
Proc. Int. Conference on Management of Data (SIGMOD)
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
9
-
-
0036204131
-
Providing database as a service
-
Hacigümüş, H., Mehrotra, S., Iyer, B.: Providing database as a service. In: Proc. Int. Conference on Data Engineering (ICDE), p. 29 (2002)
-
(2002)
Proc. Int. Conference on Data Engineering (ICDE)
, pp. 29
-
-
Hacigümüş, H.1
Mehrotra, S.2
Iyer, B.3
-
10
-
-
85065578926
-
A privacy-preserving index for range queries
-
VLDB, pp
-
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. Int. Conference on Very Large Databases (VLDB), pp. 720-731 (2004)
-
(2004)
Proc. Int. Conference on Very Large Databases
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
11
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of ACM SIGMOD International Conference on Management of Data, pp. 121-132 (2006)
-
(2006)
Proc. of ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
12
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39(1), 21-41 (2004)
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
13
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
14
-
-
33744927171
-
-
Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: Grumbach, S., Sui, L., Vianu, V. (eds.) ASIAN 2005. LNCS, 3818, pp. 28-48. Springer, Heidelberg (2005)
-
Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: Grumbach, S., Sui, L., Vianu, V. (eds.) ASIAN 2005. LNCS, vol. 3818, pp. 28-48. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
38149124657
-
Integrity checking in cryprographic file systems with constant trusted storage
-
USENIX, pp
-
Oprea, A., Reiter, M.K.: Integrity checking in cryprographic file systems with constant trusted storage. In: Proc. USENIX Security Symposium (USENIX), pp. 183-198 (2007)
-
(2007)
Proc. USENIX Security Symposium
, pp. 183-198
-
-
Oprea, A.1
Reiter, M.K.2
-
18
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668-676 (1990)
-
(1990)
Commun. ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
19
-
-
0142246303
-
-
Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, 2832, pp. 2-5. Springer, Heidelberg (2003)
-
Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2-5. Springer, Heidelberg (2003)
-
-
-
-
20
-
-
38149014557
-
-
Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, Available (2003), from http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf
-
Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, Available (2003), from http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf
-
-
-
-
21
-
-
26444561838
-
Computational bounds on hierarchical data processing with applications to information security
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 153-165. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 153-165
-
-
Tamassia, R.1
Triandopoulos, N.2
|