-
1
-
-
0036042175
-
Models and issues in data stream systems
-
Babock, B., Babu, S., Datar, M., Motwani, R., Widom, J. Models and Issues in Data Stream Systems, PODS, 2002.
-
(2002)
PODS
-
-
Babock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
2
-
-
0003772933
-
-
Springer-Verlag
-
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O. Computational Geometry: Algorithms and Applications. Springer-Verlag, 1997.
-
(1997)
Computational Geometry: Algorithms and Applications
-
-
De Berg, M.1
Van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
-
3
-
-
85011101835
-
-
www.eskimo.com/~weidai/benchmark.html
-
-
-
-
4
-
-
0038274733
-
Authentic data publication over the internet
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S. Authentic Data Publication Over the Internet. Journal of Computer Security 11(3): 291-314, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
5
-
-
2442617843
-
Issues in data stream management
-
Golab, L., Öszu, T.M. Issues in Data Stream Management. SIGMOD Record, 32(2): 5-14, 2003.
-
(2003)
SIGMOD Record
, vol.32
, Issue.2
, pp. 5-14
-
-
Golab, L.1
Öszu, T.M.2
-
8
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L. Dynamic Authenticated Index Structures for Outsourced Databases. SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
9
-
-
0001263548
-
A certified digital signature
-
Merkle, R. A Certified Digital Signature. CRYPTO, 1989.
-
(1989)
CRYPTO
-
-
Merkle, R.1
-
10
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S. A General Model for Authenticated Data Structures. Algorithmica, 39(1): 21-41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
11
-
-
33746668803
-
Signature bouquets: Immutability for aggregated/Condensed signatures
-
Mykletun, E., Narasimha, M., Tsudik, G. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS, 2004.
-
(2004)
ESORICS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
12
-
-
0009504774
-
-
National Institute of Standards and Technology National Institute of Standards and Technology
-
National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology, 1995.
-
(1995)
FIPS PUB 180-1: Secure Hash Standard
-
-
-
13
-
-
34548160016
-
Authentication of outsourced databases using signature aggregation and chaining
-
Narasimha, M., Tsudik, G. Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA, 2006.
-
(2006)
DASFAA
-
-
Narasimha, M.1
Tsudik, G.2
-
14
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L. Verifying Completeness of Relational Query Results in Data Publishing. SIGMOD, 2005.
-
(2005)
SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
15
-
-
2442590644
-
Authenticating query results in edge computing
-
Pang, H., Tan, K.-L. Authenticating Query Results in Edge Computing. ICDE, 2004.
-
(2004)
ICDE
-
-
Pang, H.1
Tan, K.-L.2
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|