-
2
-
-
0000758345
-
-
Proposed Federal Information Processing Standard for Digital Signature Standard DSS
-
Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register 56(169) (1991), 42980-42982.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
3
-
-
62749108203
-
-
Secure Hashing Algorithm, National Institute of Science and Technology, FIPS 180-2, 2001.
-
Secure Hashing Algorithm, National Institute of Science and Technology, FIPS 180-2, 2001.
-
-
-
-
4
-
-
0025447750
-
The R*-tree: An efficient and robust access method for points and rectangles
-
Atlantic City, NJ
-
N. Beckmann, H. Kriegel, R. Schneider and B. Seeger, The R*-tree: An efficient and robust access method for points and rectangles, in: SIGMOD Conference, Atlantic City, NJ, 1990, pp. 322-331.
-
(1990)
SIGMOD Conference
, pp. 322-331
-
-
Beckmann, N.1
Kriegel, H.2
Schneider, R.3
Seeger, B.4
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proceedings of Advances in Cryptohgy, EUROCRYPT'03, E. Biham, ed, Springer-Verlag
-
D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in: Proceedings of Advances in Cryptohgy - EUROCRYPT'03, E. Biham, ed., LNCS, Springer-Verlag, 2003.
-
(2003)
LNCS
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
33746749406
-
Authenticating multi-dimensional query results in data publishing
-
Sophia Antipolis, France
-
W. Cheng, H. Pang and K. Tan, Authenticating multi-dimensional query results in data publishing, in: Proceedings of the 20th Annual, IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), Sophia Antipolis, France, 2006, pp. 60-73.
-
(2006)
Proceedings of the 20th Annual, IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006)
, pp. 60-73
-
-
Cheng, W.1
Pang, H.2
Tan, K.3
-
7
-
-
38049082193
-
Authenticating kNN query results in data publishing
-
Vienna, Austria
-
W. Cheng and K. Tan., Authenticating kNN query results in data publishing, in: Proceedings of the 4th International Workshop on Secure Data Management (SDM'07), Vienna, Austria, 2007, pp. 47-63.
-
(2007)
Proceedings of the 4th International Workshop on Secure Data Management (SDM'07)
, pp. 47-63
-
-
Cheng, W.1
Tan, K.2
-
8
-
-
2442542018
-
Authentic data publication over the Internet
-
Amsterdam, The Netherlands
-
P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, Authentic data publication over the Internet, in: 14th IFIP 11.3 Working Conference in Database Security, Amsterdam, The Netherlands, 2000, pp. 102-112.
-
(2000)
14th IFIP 11.3 Working Conference in Database Security
, pp. 102-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
9
-
-
0038274733
-
Authentic data publication over the Internet
-
P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, Authentic data publication over the Internet, Journal of Computer Security 11 (2003), 291-314.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
10
-
-
84944033220
-
Constrained nearest neighbor queries
-
Los Angeles, CA
-
H. Ferhatosmanoglu, I. Stanoi, D. Agrawal and A. Abbadi, Constrained nearest neighbor queries, in: Symposium on Spatial and Temporal Databases, Los Angeles, CA, 2001, pp. 257-278.
-
(2001)
Symposium on Spatial and Temporal Databases
, pp. 257-278
-
-
Ferhatosmanoglu, H.1
Stanoi, I.2
Agrawal, D.3
Abbadi, A.4
-
11
-
-
84888527471
-
Querying the Internet with PIER
-
Berlin, Germany
-
R. Huebsch, J. Hellerstein, N. Lanham, B. Loo, S. Shenker and I. Stoica, Querying the Internet with PIER, in: Proceedings of the 29th International Conference on Very Large Databases, Berlin, Germany, 2003, pp. 321-332.
-
(2003)
Proceedings of the 29th International Conference on Very Large Databases
, pp. 321-332
-
-
Huebsch, R.1
Hellerstein, J.2
Lanham, N.3
Loo, B.4
Shenker, S.5
Stoica, I.6
-
12
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, IL
-
F. Li, M. Hadjieleftheriou, G. Kollios and L. Reyzin, Dynamic authenticated index structures for outsourced databases, in: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, Chicago, IL, 2006, pp. 121-132.
-
(2006)
Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
13
-
-
0036372525
-
Middle-tier database caching for e-business
-
Madison, WI
-
Q. Luo, S. Krishnamurthy, C. Mohan, H. Pirahesh, H. Woo, B. Lindsay and J. Naughton, Middle-tier database caching for e-business, in: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, 2002, pp. 600-611.
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 600-611
-
-
Luo, Q.1
Krishnamurthy, S.2
Mohan, C.3
Pirahesh, H.4
Woo, H.5
Lindsay, B.6
Naughton, J.7
-
14
-
-
2442588372
-
Apps on the edge
-
D. Margulius, Apps on the edge, InfoWorld 24(21) (2002), http://www.infoworld.com/article/02/05/23/020527feedgetci-1.html.
-
(2002)
InfoWorld
, vol.24
, Issue.21
-
-
Margulius, D.1
-
15
-
-
21044438930
-
A general model for authenticated data structures
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong and S.G. Stubblebine, A general model for authenticated data structures, Algorithmica 39(1) (2004), 21-41.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
16
-
-
62749115023
-
-
R. Merkle, A certified digital signature, in: Proceedings of Advances in Cryptohgy'-Crypto '89, Lecture Notes in Computer Science, 0435, 1999, pp. 218-238.
-
R. Merkle, A certified digital signature, in: Proceedings of Advances in Cryptohgy'-Crypto '89, Lecture Notes in Computer Science, Vol. 0435, 1999, pp. 218-238.
-
-
-
-
17
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany
-
G. Miklau and D. Suciu, Controlling access to published data using cryptography, in: Proceedings of the 29th International Conference on Very Large Data Bases, Berlin, Germany, 2003, pp. 898-909.
-
(2003)
Proceedings of the 29th International Conference on Very Large Data Bases
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
18
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
San Diego, CA, February
-
E. Mykletun, M. Narasimha and G. Tsudik, Authentication and integrity in outsourced databases, in: Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, February 2004.
-
(2004)
Proceedings of the Network and Distributed System Security Symposium
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
19
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. Neuman and T. Tso, Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32(9) (1994), 33-38.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Tso, T.2
-
20
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Baltimore, MD
-
H. Pang, A. Jain, K. Ramamritham and K. Tan, Verifying completeness of relational query results in data publishing, in : Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, 2005, pp. 407-418.
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
21
-
-
2442590644
-
Authenticating query results in edge computing
-
Boston, MA, March
-
H. Pang and K. Tan, Authenticating query results in edge computing, in: IEEE international conference on data engineering, Boston, MA, March 2004, pp. 560-571.
-
(2004)
IEEE international conference on data engineering
, pp. 560-571
-
-
Pang, H.1
Tan, K.2
-
23
-
-
0345359164
-
A steganographic file system
-
StegFS:, Bangalore, India, March
-
H. Pang, K. Tan and X. Zhou, StegFS: A steganographic file system, in: Proceedings of the 19th International Conference on Data Engineering, Bangalore, India, March 2003, pp. 657-668.
-
(2003)
Proceedings of the 19th International Conference on Data Engineering
, pp. 657-668
-
-
Pang, H.1
Tan, K.2
Zhou, X.3
-
24
-
-
2442450133
-
RFC 1321: The MD5 Message-Digest Algorithm
-
R. Rivest, RFC 1321: The MD5 Message-Digest Algorithm, Internet Activities Board, 1992.
-
(1992)
Internet Activities Board
-
-
Rivest, R.1
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
26
-
-
34250631783
-
Efficient content authentication over distributed hash tables
-
Technical report, Brown University
-
R. Tamassia and N. Triandopoulos, Efficient content authentication over distributed hash tables, Technical report, Brown University, 2005.
-
(2005)
-
-
Tamassia, R.1
Triandopoulos, N.2
-
28
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati, Access control: Principles and practice, IEEE Communications Magazine 32(9) (1994), 40-48.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
29
-
-
84978370407
-
An analysis of Internet content delivery systems
-
Boston, MA
-
S. Saroiu, K. Gummadi, R. Dunn, S. Gribble and H. Levy, An analysis of Internet content delivery systems, in: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, 2002, pp. 315-327.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 315-327
-
-
Saroiu, S.1
Gummadi, K.2
Dunn, R.3
Gribble, S.4
Levy, H.5
-
30
-
-
84944319598
-
Indexing the distance: An efficient method to kNN processing
-
Roma, Italy
-
C. Yu, B. Ooi, K. Tan and H. Jagadish, Indexing the distance: An efficient method to kNN processing, in: Proceedings of the 27th International Conference on Very Large Databases, Roma, Italy, 2001, pp. 421-430.
-
(2001)
Proceedings of the 27th International Conference on Very Large Databases
, pp. 421-430
-
-
Yu, C.1
Ooi, B.2
Tan, K.3
Jagadish, H.4
|