-
1
-
-
33845205821
-
MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library
-
MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library. http://www.shamus.ie.
-
-
-
-
2
-
-
84873848488
-
OpenSSL Project
-
OpenSSL Project. http://www.openssl.org.
-
-
-
-
4
-
-
13844271963
-
Selective and Authentic Third-Party Distribution of XML Documents
-
E. Bertino, B. Carminati, E. Ferrari, B. M. Thuraisingham, and A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10):1263-1278, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.M.4
Gupta, A.5
-
5
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
B. Bloom. Space/Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
6
-
-
4143140890
-
A Survey of Two Signature Aggregation Techniques
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. A Survey of Two Signature Aggregation Techniques. CryptoBytes, 6(2), 2003.
-
(2003)
CryptoBytes
, vol.6
, Issue.2
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. In AsiaCrypt, pages 514-532, 2001.
-
(2001)
AsiaCrypt
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
85039686150
-
Certicom. SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0
-
Certicom. SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Standards for Efficient Cryptography, September 2000. http://www.secg.org/download/aid-386/sec2 final.pdf.
-
(2000)
Standards for Efficient Cryptography
-
-
-
9
-
-
33746749406
-
Authenticating Multi-Dimensional Query Results in Data Publishing
-
W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-Dimensional Query Results in Data Publishing. In DBSec, pages 60-73, July 2006.
-
(2006)
DBSec
, pp. 60-73
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
10
-
-
84859205683
-
Query Assurance Verification for Outsourced Multi-dimensional Databases
-
W. Cheng and K.-L. Tan. Query Assurance Verification for Outsourced Multi-dimensional Databases. Journal of Computer Security, 2008.
-
(2008)
Journal of Computer Security
-
-
Cheng, W.1
Tan, K.-L.2
-
11
-
-
0018480749
-
Ubiquitous B-Tree
-
D. Comer. Ubiquitous B-Tree. ACM Computing Surveys, 11(2):121-137, 1979.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
12
-
-
0038274733
-
Authentic Data Publication over the Internet
-
P. T. Devanbu, M. Gertz, C. U. Martel, and S. G. Stubblebine. Authentic Data Publication over the Internet. Journal of Computer Security, 11(3):291-314, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
13
-
-
85039679294
-
Fact Sheet NSA Suite B Cryptography
-
Fact Sheet NSA Suite B Cryptography. National Security Agency. http://www.nsa.gov/ia/industry/crypto suite b.cfm.
-
National Security Agency
-
-
-
15
-
-
43149099270
-
Super-Efficient Verification of Dynamic Outsourced Databases
-
M. T. Goodrich, R. Tamassia, and N. Triandopoulos. Super-Efficient Verification of Dynamic Outsourced Databases. In CT-RSA, pages 407-424, 2008.
-
(2008)
CT-RSA
, pp. 407-424
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
-
16
-
-
21144454271
-
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
-
A. Joux and K. Nguyen. Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. Journal of Cryptology, 16(4):239-247, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
18
-
-
34250630995
-
Dynamic Authenticated Index Structures for Outsourced Databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD, pages 121-132, 2006.
-
(2006)
SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
19
-
-
33646734695
-
Authenticating Query Results in Data Publishing
-
D. Ma, R. H. Deng, H. Pang, and J. Zhou. Authenticating Query Results in Data Publishing. In ICICS, pages 376-388, 2005.
-
(2005)
ICICS
, pp. 376-388
-
-
Ma, D.1
Deng, R.H.2
Pang, H.3
Zhou, J.4
-
20
-
-
21044438930
-
A General Model for Authenticated Data Structures
-
C. U. Martel, G. Nuckolls, P. T. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine. A General Model for Authenticated Data Structures. Algorithmica, 39(1):21-41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.U.1
Nuckolls, G.2
Devanbu, P.T.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
21
-
-
84969346266
-
A Certified Digital Signature
-
R. C. Merkle. A Certified Digital Signature. In Crypto, pages 218-238, 1989.
-
(1989)
Crypto
, pp. 218-238
-
-
Merkle, R.C.1
-
22
-
-
58149462240
-
Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases
-
K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. International Journal on Very Large Data Bases, 18(1):363-381, 2009.
-
(2009)
International Journal on Very Large Data Bases
, vol.18
, Issue.1
, pp. 363-381
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
23
-
-
33747176236
-
Authentication and Integrity in Outsourced Databases
-
M. Narasimha, E. Mykletun, and G. Tsudik. Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2(2):107-138, May 2006.
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Narasimha, M.1
Mykletun, E.2
Tsudik, G.3
-
24
-
-
33745528450
-
Authentication of Outsourced Databases using Signature Aggregation and Chaining
-
M. Narasimha and G. Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In DASFAA, pages 420-436, 2006.
-
(2006)
DASFAA
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
25
-
-
26444554946
-
Verified Query Results from Hybrid Authentication Trees
-
G. Nuckolls. Verified Query Results from Hybrid Authentication Trees. In DBSec, pages 84-98, 2005.
-
(2005)
DBSec
, pp. 84-98
-
-
Nuckolls, G.1
-
26
-
-
29844457793
-
Verifying Completeness of Relational Query Results in Data Publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In ACM SIGMOD, pages 407-418, 2005.
-
(2005)
ACM SIGMOD
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
27
-
-
2442590644
-
Authenticating Query Results in Edge Computing
-
H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In IEEE ICDE, pages 560-571, 2004.
-
(2004)
IEEE ICDE
, pp. 560-571
-
-
Pang, H.1
Tan, K.-L.2
-
28
-
-
85011016388
-
CADS: Continuous Authentication on Data Streams
-
S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, pages 135-146, 2007.
-
(2007)
VLDB
, pp. 135-146
-
-
Papadopoulos, S.1
Yang, Y.2
Papadias, D.3
-
29
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
30
-
-
84865086653
-
Prefix Compression of Sparse Binary Strings
-
D. Salomon. Prefix Compression of Sparse Binary Strings. Crossroads, 6(3):22-25, 2000.
-
(2000)
Crossroads
, vol.6
, Issue.3
, pp. 22-25
-
-
Salomon, D.1
-
31
-
-
85039677615
-
SHA
-
NIST. FIPS
-
SHA. Secure Hashing Algorithm. NIST. FIPS 180-2, 2001.
-
(2001)
Secure Hashing Algorithm
, pp. 180-182
-
-
-
32
-
-
85039694120
-
The Case for Elliptic Curve Cryptography
-
The Case for Elliptic Curve Cryptography. National Security Agency. http://www.nsa.gov/ia/industry/crypto elliptic curve.cfm.
-
National Security Agency
-
-
|