-
1
-
-
77958484856
-
Authentic third-party data publication
-
Devanbu, P. T., Gertz, M., Martel, C. U., Stubblebine, S. G.: Authentic third-party data publication. In: DBSEC, pp. 101-112 (2001)
-
(2001)
DBSEC
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
2
-
-
37849020807
-
Authenticated relational tables and authenticated skip lists
-
Di Battista, G., Palazzi, B.: Authenticated relational tables and authenticated skip lists. In: DBSEC, pp. 31-46 (2007)
-
(2007)
DBSEC
, pp. 31-46
-
-
Di Battista, G.1
Palazzi, B.2
-
4
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD Conf., pp. 407-418 (2005)
-
(2005)
SIGMOD Conf.
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
6
-
-
84997556980
-
Integrity auditing of outsourced data
-
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: VLDB, pp. 782-793 (2007)
-
(2007)
VLDB
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
7
-
-
43349091759
-
Providing freshness guarantees for outsourced databases
-
ACM, New York
-
Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: EDBT, pp. 323-332. ACM, New York (2008)
-
(2008)
EDBT
, pp. 323-332
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
8
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. Trans. Storage 2(2), 107-138 (2006)
-
(2006)
Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
9
-
-
0142246303
-
Authenticated data structures
-
di Battista, G., Zwick, U. eds., Springer, Heidelberg, ESA 2003
-
Tamassia, R.: Authenticated data structures. In: di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2-5. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2832
, pp. 2-5
-
-
Tamassia, R.1
-
10
-
-
84969346266
-
A certified digital signature
-
Brassard, G. ed., Springer, Heidelberg, CRYPTO 1989
-
Merkle, R. C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
11
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
Goodrich, M. T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proc. DISCEX II, pp. 68-82 (2001)
-
(2001)
Proc. DISCEX II
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
12
-
-
33846436953
-
Undeniable replies for database queries
-
Buldas, A., Roos, M., Willemson, J.: Undeniable replies for database queries. In: Proc. Intern. Baltic Conf. on DB and IS, vol. 2, pp. 215-226 (2002)
-
(2002)
Proc. Intern. Baltic Conf. on DB and IS
, vol.2
, pp. 215-226
-
-
Buldas, A.1
Roos, M.2
Willemson, J.3
-
13
-
-
43149099270
-
Super-efficient verification of dynamic outsourced databases
-
Malkin, T. G. ed., Springer, Heidelberg, CT-RSA 2008
-
Goodrich, M. T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In: Malkin, T. G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 407-424. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4964
, pp. 407-424
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
-
14
-
-
0038274733
-
Authentic data publication over the Internet
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S. G.: Authentic data publication over the Internet. Journal of Computer Security 11(3), 291-314 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
15
-
-
43349086016
-
Ensuring correctness over untrusted private database
-
ACM, New York
-
Singh, S., Prabhakar, S.: Ensuring correctness over untrusted private database. In: EDBT 2008, pp. 476-486. ACM, New York (2008)
-
(2008)
EDBT 2008
, pp. 476-486
-
-
Singh, S.1
Prabhakar, S.2
-
16
-
-
70849087019
-
Authenticated join processing in outsourced databases
-
ACM, New York
-
Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: SIGMOD 2009, pp. 5-18. ACM, New York (2009)
-
(2009)
SIGMOD 2009
, pp. 5-18
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
17
-
-
77958500673
-
Scalable delivery of stream query results
-
Zhou, Y., Salehi, A., Aberer, K.: Scalable delivery of stream query results. PVLDB 2(1), 49-60 (2009)
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 49-60
-
-
Zhou, Y.1
Salehi, A.2
Aberer, K.3
-
18
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B. H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422-426 (1970)
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
20
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: ACM SIGMOD, pp. 121-132 (2006)
-
(2006)
ACM SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
21
-
-
70249099300
-
Ensuring correctness, completeness, and freshness for outsourced treeindexed data
-
Dang, T. K.: Ensuring correctness, completeness, and freshness for outsourced treeindexed data. Information Resources Management Jrnl., 59-76 (2008)
-
(2008)
Information Resources Management Jrnl.
, pp. 59-76
-
-
Dang, T.K.1
-
22
-
-
33745528450
-
Authentication of outsourced databases using signature aggregation and chaining
-
Li Lee, M., Tan, K.-L., Wuwongse, V. eds., Springer, Heidelberg, DASFAA 2006
-
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420-436. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3882
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
23
-
-
52649150749
-
Spatial outsourcing for location-based services
-
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: ICDE, pp. 1082-1091 (2008)
-
(2008)
ICDE
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
25
-
-
85031897770
-
Skip lists: A probabilistic alternative to balanced trees
-
Pugh, W.: Skip lists: A probabilistic alternative to balanced trees. In: Workshop on Algorithms and Data Structures, pp. 437-449 (1989)
-
(1989)
Workshop on Algorithms and Data Structures
, pp. 437-449
-
-
Pugh, W.1
-
26
-
-
77958471170
-
-
UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences
-
UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences (2007), http://www.ics.uci.edu/~mlearn/ MLRepository.html
-
(2007)
-
-
|