-
2
-
-
13844271963
-
Selective and Authentic Third-Party Distribution of XML Documents
-
E. Bertino, B. Carminati, E. Ferrari, B. M. Thuraisingham, and A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10), 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.M.4
Gupta, A.5
-
3
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In EUROCRYPT, pages 416-432, 2003.
-
(2003)
EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
4
-
-
0038589165
-
The Anatomy of a Large-Scale Hypertextual Web Search Engine
-
S. Brin and L. Page. The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems, 30(1-7):107-117, 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
5
-
-
33746749406
-
Authenticating Multi-Dimensional Query Results in Data Publishing
-
July
-
W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-Dimensional Query Results in Data Publishing. In DBSec, pages 60-73, July 2006.
-
(2006)
DBSec
, pp. 60-73
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
6
-
-
84859205683
-
Query Assurance Verification for Outsourced Multi-dimensional Databases
-
W. Cheng and K.-L. Tan. Query Assurance Verification for Outsourced Multi-dimensional Databases. Journal of Computer Security, 2008.
-
(2008)
Journal of Computer Security
-
-
Cheng, W.1
Tan, K.-L.2
-
7
-
-
0018480749
-
Ubiquitous B-Tree
-
D. Comer. Ubiquitous B-Tree. ACM Computing Surveys, 11(2):121-137, 1979.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
8
-
-
77958484856
-
Authentic Third-Party Data Publication
-
P. T. Devanbu, M. Gertz, C. U. Martel, and S. G. Stubblebine. Authentic Third-Party Data Publication. In DBSec, pages 101-112, 2000.
-
(2000)
DBSec
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
9
-
-
0000758345
-
Proposed Federal Information Processing Standard for Digital Signature Standard
-
DSS
-
DSS. Proposed Federal Information Processing Standard for Digital Signature Standard. Federal Register, 56(169):42980-42982, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
10
-
-
0038504811
-
Optimal Aggregation Algorithms for Middleware
-
R. Fagin, A. Lotem, and M. Naor. Optimal Aggregation Algorithms for Middleware. Journal of Computer and Systems Sciences, 66(4):614-656, 2003.
-
(2003)
Journal of Computer and Systems Sciences
, vol.66
, Issue.4
, pp. 614-656
-
-
Fagin, R.1
Lotem, A.2
Naor, M.3
-
11
-
-
4243148480
-
Authoritative Sources in a Hyperlinked Environment
-
J. M. Kleinberg. Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5):604-632, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.M.1
-
12
-
-
0035049111
-
On the 'Dimensionality Curse' and the 'Self-Similarity Blessing'
-
January
-
F. Korn, B.-U. Pagel, and C. Faloutsos. On the 'Dimensionality Curse' and the 'Self-Similarity Blessing'. IEEE Transactions on Knowledge and Data Engineering, 13(1):96-111, January 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.1
, pp. 96-111
-
-
Korn, F.1
Pagel, B.-U.2
Faloutsos, C.3
-
13
-
-
34250630995
-
Dynamic Authenticated Index Structures for Outsourced Databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In ACM SIGMOD, pages 121-132, 2006.
-
(2006)
ACM SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
14
-
-
85011031975
-
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams
-
F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. In VLDB, pages 147-158, 2007.
-
(2007)
VLDB
, pp. 147-158
-
-
Li, F.1
Yi, K.2
Hadjieleftheriou, M.3
Kollios, G.4
-
15
-
-
85038452936
-
-
Lucene. Apache Lucene Search Engine
-
Lucene. Apache Lucene Search Engine. http://lucene.apache.org/java/docs/.
-
-
-
-
16
-
-
21044438930
-
A General Model for Authenticated Data Structures
-
C. U. Martel, G. Nuckolls, P. T. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine. A General Model for Authenticated Data Structures. Algorithmica, 39(1):21-41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.U.1
Nuckolls, G.2
Devanbu, P.T.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
17
-
-
84969346266
-
A Certified Digital Signature
-
R. Merkle. A Certified Digital Signature. In Crypto, pages 218-238, 1989.
-
(1989)
Crypto
, pp. 218-238
-
-
Merkle, R.1
-
18
-
-
33745798432
-
DSAC: Integrity for Outsourced Databases with Signature Aggregation and Chaining
-
M. Narasimha and G. Tsudik. DSAC: Integrity for Outsourced Databases with Signature Aggregation and Chaining. In CIKM, pages 235-236, 2005.
-
(2005)
CIKM
, pp. 235-236
-
-
Narasimha, M.1
Tsudik, G.2
-
19
-
-
29844457793
-
Verifying Completeness of Relational Query Results in Data Publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In ACM SIGMOD, pages 407-418, 2005.
-
(2005)
ACM SIGMOD
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
20
-
-
2442590644
-
Authenticating Query Results in Edge Computing
-
H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In IEEE ICDE, pages 560-571, 2004.
-
(2004)
IEEE ICDE
, pp. 560-571
-
-
Pang, H.1
Tan, K.-L.2
-
21
-
-
40049111546
-
Verifying Completeness of Relational Query Answers from Online Servers
-
H. Pang and K.-L. Tan. Verifying Completeness of Relational Query Answers from Online Servers. ACM Transactions on Information and System Security, 11(2):1-50, 2008.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.2
, pp. 1-50
-
-
Pang, H.1
Tan, K.-L.2
-
22
-
-
85011016388
-
CADS: Continuous Authentication on Data Streams
-
S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, pages 135-146, 2007.
-
(2007)
VLDB
, pp. 135-146
-
-
Papadopoulos, S.1
Yang, Y.2
Papadias, D.3
-
25
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
26
-
-
0344379339
-
-
SHA. NIST. FIPS
-
SHA. Secure Hashing Algorithm. NIST. FIPS 180-2, 2001.
-
(2001)
Secure Hashing Algorithm
, pp. 180-182
-
-
-
27
-
-
58349110852
-
Privacy Protection in Personalized Search
-
June
-
X. Shen, B. Tan, and C. Zhai. Privacy Protection in Personalized Search. ACM SIGIR, 41(1):4-17, June 2007.
-
(2007)
ACM SIGIR
, vol.41
, Issue.1
, pp. 4-17
-
-
Shen, X.1
Tan, B.2
Zhai, C.3
-
28
-
-
0034818651
-
Searching the Web: The Public and Their Queries
-
February
-
A. Spink, D. Wolfram, B. Jansen, and T. Saracevic. Searching the Web: The Public and Their Queries. Journal of the American Society for Information Science and Technology, 52(3):226-234, February 2001.
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.3
, pp. 226-234
-
-
Spink, A.1
Wolfram, D.2
Jansen, B.3
Saracevic, T.4
-
29
-
-
85038471469
-
-
TREC. Text REtrieval Conference
-
TREC. Text REtrieval Conference. http://trec.nist.gov/.
-
-
-
-
30
-
-
33750984193
-
Minimum-Cost Network Hardening Using Attack Graphs
-
L. Wang, S. Noel, and S. Jajodia. Minimum-Cost Network Hardening Using Attack Graphs. Computer Communications, 29(18):3812-3824, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
31
-
-
0030407491
-
Query Expansion Using Local and Global Document Analysis
-
J. Xu and W. B. Croft. Query Expansion Using Local and Global Document Analysis. In ACM SIGIR, pages 4-11, 1996.
-
(1996)
ACM SIGIR
, pp. 4-11
-
-
Xu, J.1
Croft, W.B.2
-
32
-
-
33747729581
-
Inverted Files for Text Search Engine
-
July
-
J. Zobel and A. Moffat. Inverted Files for Text Search Engine. ACM Computing Surveys, 38(2), July 2006.
-
(2006)
ACM Computing Surveys
, vol.38
, Issue.2
-
-
Zobel, J.1
Moffat, A.2
|