-
2
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
Alon, N., Matias, Y., and Szegedy, M. The space complexity of approximating the frequency moments. J. Comput. Syst. Sci. 58, 1 (1999), 137-147.
-
(1999)
J. Comput. Syst. Sci.
, vol.58
, Issue.1
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
3
-
-
0038297734
-
Counting distinct elements in a data stream
-
Bar-Yossef, Z., Jayram, T., Kumar, R., Sivakumar, D., and Trevisan, L. Counting distinct elements in a data stream. In RANDOM (2002).
-
(2002)
RANDOM
-
-
Bar-Yossef, Z.1
Jayram, T.2
Kumar, R.3
Sivakumar, D.4
Trevisan, L.5
-
4
-
-
5744224341
-
Fast batch verification for modular exponentiation and digital signatures
-
Bellare, M., Garay, J., and Rabin, T. Fast batch verification for modular exponentiation and digital signatures. In Eurocrypt (1998).
-
(1998)
Eurocrypt
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
5
-
-
33845808851
-
SIA: Secure information aggregation in sensor networks
-
Chan, H., Perrig, A., Przydatek, B., and Song, D. SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15, 1 (2007), 69-102.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 69-102
-
-
Chan, H.1
Perrig, A.2
Przydatek, B.3
Song, D.4
-
7
-
-
2442576849
-
Approximate aggregation techniques for sensor databases
-
Considine, J., Li, F., Kollios, G., and Byers, J. Approximate aggregation techniques for sensor databases. In ICDE (2004).
-
(2004)
ICDE
-
-
Considine, J.1
Li, F.2
Kollios, G.3
Byers, J.4
-
8
-
-
35048819960
-
An improved data stream summary: The count-min sketch and its applications
-
Cormode, G., and Muthukrishnan, S. An improved data stream summary: The count-min sketch and its applications. LATIN 2004: Theoretical Informatics (2004), 29-38.
-
(2004)
LATIN 2004: Theoretical Informatics
, pp. 29-38
-
-
Cormode, G.1
Muthukrishnan, S.2
-
9
-
-
1142303679
-
Cache-and-query for wide area sensor databases
-
Deshpande, A., Nath, S., Gibbons, P. B., and Seshan, S. Cache-and-query for wide area sensor databases. In SIGMOD (2003).
-
(2003)
SIGMOD
-
-
Deshpande, A.1
Nath, S.2
Gibbons, P.B.3
Seshan, S.4
-
10
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
Flajolet, P., and Martin, G. N. Probabilistic counting algorithms for data base applications. J. Comput. Syst. Sci. 31, 2 (1985), 182-209.
-
(1985)
J. Comput. Syst. Sci.
, vol.31
, Issue.2
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.N.2
-
12
-
-
36248949044
-
Senseweb: An infrastructure for shared sensing
-
Kansal, A., Nath, S., Liu, J., and Zhao, F. Senseweb: An infrastructure for shared sensing. IEEE Multimedia 14, 4 (2007).
-
(2007)
IEEE Multimedia
, vol.14
, Issue.4
-
-
Kansal, A.1
Nath, S.2
Liu, J.3
Zhao, F.4
-
13
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., and Reyzin, L. Dynamic authenticated index structures for outsourced databases. In ACM SIGMOD (2006).
-
(2006)
ACM SIGMOD
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
14
-
-
33746668803
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Mykletun, E., Narasimha, M., and Tsudik, G. Signature bouquets: Immutability for aggregated/condensed signatures. In ESORICS (2004).
-
(2004)
ESORICS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
15
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun, E., Narasimha, M., and Tsudik, G. Authentication and integrity in outsourced databases. ACM Trans. Storage 2, 2 (2006), 107-138.
-
(2006)
ACM Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
16
-
-
33745798432
-
DSAC: Integrity of outsourced databases with signature aggregation and chaining
-
Narasimha, M., and Tsudik, G. DSAC: Integrity of outsourced databases with signature aggregation and chaining. In CIKM (2005).
-
(2005)
CIKM
-
-
Narasimha, M.1
Tsudik, G.2
-
17
-
-
42149159041
-
Synopsis diffusion for robust aggregation in sensor networks
-
Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. Synopsis diffusion for robust aggregation in sensor networks. ACM Transactions on Sensor Networks (TOSN) 4, 2 (2008).
-
(2008)
ACM Transactions on Sensor Networks (TOSN)
, vol.4
, Issue.2
-
-
Nath, S.1
Gibbons, P.B.2
Seshan, S.3
Anderson, Z.4
-
18
-
-
25844479980
-
Synopsis diffusion for robust aggregation in sensor networks
-
Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. Synopsis diffusion for robust aggregation in sensor networks. In ACM SenSys (2004).
-
(2004)
ACM SenSys
-
-
Nath, S.1
Gibbons, P.B.2
Seshan, S.3
Anderson, Z.R.4
-
20
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., and Tan, K.-L. Verifying completeness of relational query results in data publishing. In ACM SIGMOD (2005).
-
(2005)
ACM SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.L.4
-
22
-
-
2442590644
-
Authenticating query results in edge computing
-
Pang, H., and Tan, K.-L. Authenticating query results in edge computing. In ICDE (2004).
-
(2004)
ICDE
-
-
Pang, H.1
Tan, K.L.2
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
0343349510
-
A weak privacy protocol using the RSA crypto algorithm
-
Simmons, G. J. A weak privacy protocol using the RSA crypto algorithm. Cryptologia 7, 2 (1983), 180-182.
-
(1983)
Cryptologia
, vol.7
, Issue.2
, pp. 180-182
-
-
Simmons, G.J.1
-
25
-
-
33745601730
-
Query execution assurance for outsourced databases
-
Sion, R. Query execution assurance for outsourced databases. In VLDB (2005).
-
(2005)
VLDB
-
-
Sion, R.1
-
27
-
-
70849129424
-
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
-
Yu, H. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In ACM/IEEE IPSN (2009).
-
(2009)
ACM/IEEE IPSN
-
-
Yu, H.1
|