메뉴 건너뛰기




Volumn , Issue , 2009, Pages 31-44

Secure outsourced aggregation via one-way chains

Author keywords

Secure outsourced aggregation; Wide area sensing

Indexed keywords

AGGREGATE FUNCTION; AGGREGATION BEHAVIOR; AGGREGATION MODEL; COMMUNICATION LOAD; EVALUATION RESULTS; OUTSOURCE; SENSOR DATA COLLECTIONS; THIRD-PARTY SERVICE PROVIDERS; WIDE AREA;

EID: 70849122470     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1559845.1559851     Document Type: Conference Paper
Times cited : (36)

References (27)
  • 2
    • 0033077324 scopus 로고    scopus 로고
    • The space complexity of approximating the frequency moments
    • Alon, N., Matias, Y., and Szegedy, M. The space complexity of approximating the frequency moments. J. Comput. Syst. Sci. 58, 1 (1999), 137-147.
    • (1999) J. Comput. Syst. Sci. , vol.58 , Issue.1 , pp. 137-147
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 4
    • 5744224341 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Bellare, M., Garay, J., and Rabin, T. Fast batch verification for modular exponentiation and digital signatures. In Eurocrypt (1998).
    • (1998) Eurocrypt
    • Bellare, M.1    Garay, J.2    Rabin, T.3
  • 7
    • 2442576849 scopus 로고    scopus 로고
    • Approximate aggregation techniques for sensor databases
    • Considine, J., Li, F., Kollios, G., and Byers, J. Approximate aggregation techniques for sensor databases. In ICDE (2004).
    • (2004) ICDE
    • Considine, J.1    Li, F.2    Kollios, G.3    Byers, J.4
  • 8
    • 35048819960 scopus 로고    scopus 로고
    • An improved data stream summary: The count-min sketch and its applications
    • Cormode, G., and Muthukrishnan, S. An improved data stream summary: The count-min sketch and its applications. LATIN 2004: Theoretical Informatics (2004), 29-38.
    • (2004) LATIN 2004: Theoretical Informatics , pp. 29-38
    • Cormode, G.1    Muthukrishnan, S.2
  • 10
    • 0020828424 scopus 로고
    • Probabilistic counting algorithms for data base applications
    • Flajolet, P., and Martin, G. N. Probabilistic counting algorithms for data base applications. J. Comput. Syst. Sci. 31, 2 (1985), 182-209.
    • (1985) J. Comput. Syst. Sci. , vol.31 , Issue.2 , pp. 182-209
    • Flajolet, P.1    Martin, G.N.2
  • 11
    • 34548791705 scopus 로고    scopus 로고
    • Proof sketches: Verifiable in-network aggregation
    • Garofalakis, M., Hellerstein, J., and Maniatis, P. Proof sketches: Verifiable in-network aggregation. In ICDE (2007).
    • (2007) ICDE
    • Garofalakis, M.1    Hellerstein, J.2    Maniatis, P.3
  • 12
    • 36248949044 scopus 로고    scopus 로고
    • Senseweb: An infrastructure for shared sensing
    • Kansal, A., Nath, S., Liu, J., and Zhao, F. Senseweb: An infrastructure for shared sensing. IEEE Multimedia 14, 4 (2007).
    • (2007) IEEE Multimedia , vol.14 , Issue.4
    • Kansal, A.1    Nath, S.2    Liu, J.3    Zhao, F.4
  • 13
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Li, F., Hadjieleftheriou, M., Kollios, G., and Reyzin, L. Dynamic authenticated index structures for outsourced databases. In ACM SIGMOD (2006).
    • (2006) ACM SIGMOD
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 14
    • 33746668803 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/condensed signatures
    • Mykletun, E., Narasimha, M., and Tsudik, G. Signature bouquets: Immutability for aggregated/condensed signatures. In ESORICS (2004).
    • (2004) ESORICS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 15
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • Mykletun, E., Narasimha, M., and Tsudik, G. Authentication and integrity in outsourced databases. ACM Trans. Storage 2, 2 (2006), 107-138.
    • (2006) ACM Trans. Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 16
    • 33745798432 scopus 로고    scopus 로고
    • DSAC: Integrity of outsourced databases with signature aggregation and chaining
    • Narasimha, M., and Tsudik, G. DSAC: Integrity of outsourced databases with signature aggregation and chaining. In CIKM (2005).
    • (2005) CIKM
    • Narasimha, M.1    Tsudik, G.2
  • 18
    • 25844479980 scopus 로고    scopus 로고
    • Synopsis diffusion for robust aggregation in sensor networks
    • Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. Synopsis diffusion for robust aggregation in sensor networks. In ACM SenSys (2004).
    • (2004) ACM SenSys
    • Nath, S.1    Gibbons, P.B.2    Seshan, S.3    Anderson, Z.R.4
  • 20
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Pang, H., Jain, A., Ramamritham, K., and Tan, K.-L. Verifying completeness of relational query results in data publishing. In ACM SIGMOD (2005).
    • (2005) ACM SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.L.4
  • 22
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Pang, H., and Tan, K.-L. Authenticating query results in edge computing. In ICDE (2004).
    • (2004) ICDE
    • Pang, H.1    Tan, K.L.2
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 0343349510 scopus 로고
    • A weak privacy protocol using the RSA crypto algorithm
    • Simmons, G. J. A weak privacy protocol using the RSA crypto algorithm. Cryptologia 7, 2 (1983), 180-182.
    • (1983) Cryptologia , vol.7 , Issue.2 , pp. 180-182
    • Simmons, G.J.1
  • 25
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Sion, R. Query execution assurance for outsourced databases. In VLDB (2005).
    • (2005) VLDB
    • Sion, R.1
  • 27
    • 70849129424 scopus 로고    scopus 로고
    • Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
    • Yu, H. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In ACM/IEEE IPSN (2009).
    • (2009) ACM/IEEE IPSN
    • Yu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.