메뉴 건너뛰기




Volumn , Issue , 2008, Pages 115-136

Authenticated index structures for outsourced databases

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84890206041     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-48533-1_5     Document Type: Chapter
Times cited : (7)

References (37)
  • 10
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Sion, R.: Query execution assurance for outsourced databases. In: Proc. of Very Large Data Bases (VLDB). (2005) 601-612
    • (2005) Proc. of Very Large Data Bases (VLDB). , pp. 601-612
    • Sion, R.1
  • 11
    • 21044449695 scopus 로고    scopus 로고
    • Persistent authenticated dictionaries and their applications
    • Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: ISC. (2001) 379-393
    • (2001) ISC. , pp. 379-393
    • Anagnostopoulos, A.1    Goodrich, M.2    Tamassia, R.3
  • 12
    • 35248831605 scopus 로고    scopus 로고
    • Authenticated data structures for graph and geometric searching
    • Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: CT-RSA. (2003) 295-313
    • (2003) CT-RSA. , pp. 295-313
    • Goodrich, M.1    Tamassia, R.2    Triandopoulos, N.3    Cohen, R.4
  • 13
    • 26444561838 scopus 로고    scopus 로고
    • Computational bounds on hierarchical data processing with applications to information security
    • Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: ICALP. (2005) 153-165
    • (2005) ICALP. , pp. 153-165
    • Tamassia, R.1    Triandopoulos, N.2
  • 17
    • 0009504774 scopus 로고
    • National Institute of Standards and Technology National Institute of Standards and Technology
    • National Institute of Standards and Technology: FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)
    • (1995) FIPS PUB 180-1: Secure Hash Standard
  • 18
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full sha-1
    • Wang, X., Yin, Y., Yu, H.: Finding collisions in the full sha-1. In: CRYPTO. (2005)
    • (2005) CRYPTO.
    • Wang, X.1    Yin, Y.2    Yu, H.3
  • 20
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2) (1988) 96-99
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 96-99
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (CACM) 21(2) (1978) 120-126
    • (1978) Communications of the ACM (CACM) , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0018480749 scopus 로고
    • The ubiquitous B-tree
    • Comer, D.: The ubiquitous B-tree. ACM Computing Surveys 11(2) (1979) 121-137
    • (1979) ACM Computing Surveys , vol.11 , Issue.2 , pp. 121-137
    • Comer, D.1
  • 31
    • 52649097332 scopus 로고    scopus 로고
    • Authenticating multi-dimensional query results in data publishing
    • Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: DBSec. (2006)
    • (2006) DBSec.
    • Cheng, W.1    Pang, H.2    Tan, K.3
  • 32
    • 26444554946 scopus 로고    scopus 로고
    • Verified query results from hybrid authentication trees
    • Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec. (2005) 84-98
    • (2005) DBSec. , pp. 84-98
    • Nuckolls, G.1
  • 34
    • 33745528450 scopus 로고    scopus 로고
    • Authentication of outsourced databases using signature aggregation and chaining
    • Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: DASFAA. (2006) 420-436
    • (2006) DASFAA. , pp. 420-436
    • Narasimha, M.1    Tsudik, G.2
  • 35
    • 0040746902 scopus 로고    scopus 로고
    • Progressive approximate aggregate queries with a multi-resolution tree structure
    • Lazaridis, I., Mehrotra, S.: Progressive approximate aggregate queries with a multi-resolution tree structure. In: Proc. of ACM Management of Data (SIGMOD). (2001) 401-412
    • (2001) Proc. of ACM Management of Data (SIGMOD). , pp. 401-412
    • Lazaridis, I.1    Mehrotra, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.