A General Model for Authenticated Data Structures
暂无分享,去创建一个
Michael Gertz | Charles U. Martel | Premkumar T. Devanbu | Stuart G. Stubblebine | Glen Nuckolls | April Kwong | C. Martel | S. Stubblebine | Glen Nuckolls | April Kwong | Michael Gertz
[1] Dan E. Willard,et al. New Data Structures for Orthogonal Range Queries , 1985, SIAM J. Comput..
[2] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[3] Jeffrey Scott Vitter,et al. On two-dimensional indexability and optimal range search indexing , 1999, PODS '99.
[4] William Pugh,et al. Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.
[5] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[6] Premkumar T. Devanbu,et al. Stack and queue integrity on hostile platforms , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Konstantin V. Shvachko,et al. Different Modifications of Pointer Machines and Their Computational Power , 1991, MFCS.
[8] Mary Baker,et al. Secure History Preservation Through Timeline Entanglement , 2002, USENIX Security Symposium.
[9] David Thomas,et al. The Art in Computer Programming , 2001 .
[10] Arnold Schönhage,et al. Storage Modification Machines , 1979, SIAM J. Comput..
[11] M. V. Kreveld. Computational Geometry , 2000, Springer Berlin Heidelberg.
[12] V. A. Uspenski,et al. On the Definition of an Algorithm , 1963 .
[13] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[14] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[15] Michael T. Goodrich,et al. Education forum: Web Enhanced Textbooks , 1998, SIGA.
[16] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[17] Leonidas J. Guibas,et al. Fractional cascading: I. A data structuring technique , 1986, Algorithmica.
[18] Sridhar Ramaswamy,et al. Indexing for Data Models with Constraints and Classes , 1996, J. Comput. Syst. Sci..
[19] Amir M. Ben-Amram,et al. What is a “pointer machine”? , 1995, SIGA.
[20] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[21] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[22] Dan Gusfield,et al. Algorithms on strings , 1997 .
[23] Michael T. Goodrich,et al. Authenticated Data Structures for Graph and Geometric Searching , 2003, CT-RSA.
[24] Donald E. Knuth,et al. The art of computer programming: V.1.: Fundamental algorithms , 1997 .
[25] Donald E. Knuth. The art of computer programming: fundamental algorithms , 1969 .
[26] Peeter Laud,et al. Eliminating Counterevidence with Applications to Accountable Certificate Management , 2002, J. Comput. Secur..
[27] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[28] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.