메뉴 건너뛰기




Volumn , Issue , 2007, Pages 135-146

CADS: Continuous authentication on data streams

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMMUNICATION SYSTEMS; INDEXING (MATERIALS WORKING); QUERY PROCESSING;

EID: 85011016388     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (69)

References (16)
  • 3
    • 85011101835 scopus 로고    scopus 로고
    • www.eskimo.com/~weidai/benchmark.html
  • 5
    • 2442617843 scopus 로고    scopus 로고
    • Issues in data stream management
    • Golab, L., Öszu, T.M. Issues in Data Stream Management. SIGMOD Record, 32(2): 5-14, 2003.
    • (2003) SIGMOD Record , vol.32 , Issue.2 , pp. 5-14
    • Golab, L.1    Öszu, T.M.2
  • 8
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L. Dynamic Authenticated Index Structures for Outsourced Databases. SIGMOD, 2006.
    • (2006) SIGMOD
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 9
    • 0001263548 scopus 로고
    • A certified digital signature
    • Merkle, R. A Certified Digital Signature. CRYPTO, 1989.
    • (1989) CRYPTO
    • Merkle, R.1
  • 11
    • 33746668803 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/Condensed signatures
    • Mykletun, E., Narasimha, M., Tsudik, G. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS, 2004.
    • (2004) ESORICS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 12
    • 0009504774 scopus 로고
    • National Institute of Standards and Technology National Institute of Standards and Technology
    • National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology, 1995.
    • (1995) FIPS PUB 180-1: Secure Hash Standard
  • 13
    • 34548160016 scopus 로고    scopus 로고
    • Authentication of outsourced databases using signature aggregation and chaining
    • Narasimha, M., Tsudik, G. Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA, 2006.
    • (2006) DASFAA
    • Narasimha, M.1    Tsudik, G.2
  • 14
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Pang, H., Jain, A., Ramamritham, K., Tan, K.-L. Verifying Completeness of Relational Query Results in Data Publishing. SIGMOD, 2005.
    • (2005) SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 15
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Pang, H., Tan, K.-L. Authenticating Query Results in Edge Computing. ICDE, 2004.
    • (2004) ICDE
    • Pang, H.1    Tan, K.-L.2
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.