On the Cost of Persistence and Authentication in Skip Lists
暂无分享,去创建一个
Michael T. Goodrich | Roberto Tamassia | Charalampos Papamanthou | Charalampos Papamanthou | M. Goodrich | R. Tamassia
[1] Neal E. Young,et al. Data collection for the Sloan Digital Sky Survey—a network-flow heuristic , 1996, SODA '96.
[2] Robert E. Tarjan,et al. Making data structures persistent , 1986, STOC '86.
[3] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[4] Andrzej Pelc,et al. Deterministic Rendezvous in Graphs , 2003 .
[5] Richard M. Karp,et al. Mapping the genome: some combinatorial problems arising in molecular biology , 1993, STOC.
[6] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Helmut Prodinger,et al. The path length of random skip lists , 1994, Acta Informatica.
[8] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[9] Rafail Ostrovsky,et al. Fast digital identity revocation , 1998 .
[10] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[11] Carl A. Gunter,et al. Generalized certificate revocation , 2000, POPL '00.
[12] Eric N. Hanson,et al. The Interval Skip List: A Data Structure for Finding All Intervals that Overlap a Point , 1991, WADS.
[13] Niklaus Wirth,et al. Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.
[14] Stephen Kent. Sloan Digital Sky Survey , 1994 .
[15] Peeter Laud,et al. Eliminating Counterevidence with Applications to Accountable Certificate Management , 2002, J. Comput. Secur..
[16] Alexander S. Szalay,et al. The Science Archive for the Sloan Digital Sky Survey , 1996 .
[17] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[18] Rafail Ostrovsky,et al. Fast Digital Identity Revocation (Extended Abstract) , 1998, CRYPTO.
[19] Michael T. Goodrich,et al. Authenticated Data Structures for Graph and Geometric Searching , 2003, CT-RSA.
[20] Roberto Tamassia,et al. Computational Bounds on Hierarchical Data Processing with Applications to Information Security , 2005, ICALP.
[21] Roberto Tamassia,et al. Authenticated Data Structures , 2003, ESA.
[22] Gilles Dowek,et al. Principles of programming languages , 1981, Prentice Hall International Series in Computer Science.
[23] William Pugh,et al. Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.
[24] Peter Drake,et al. Data structures and algorithms in Java , 2005 .
[25] Peter Gemmell,et al. Efficient and Fresh Cerification , 2000, Public Key Cryptography.
[26] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[27] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[28] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[29] J. Ian Munro,et al. The Binomial Transform and its Application to the Analysis of Skip Lists , 1995, ESA.
[30] Glen Nuckolls. Verified Query Results from Hybrid Authentication Trees , 2005, DBSec.
[31] Alexander S. Szalay,et al. The Sloan Digital Sky Survey , 1999, Comput. Sci. Eng..
[32] J. Ian Munro,et al. Average search and update costs in skip lists , 1992, BIT.
[33] Paul G. Spirakis,et al. Algorithms — ESA '95 , 1995, Lecture Notes in Computer Science.
[34] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[35] Kurt Mehlhorn,et al. LEDA: a platform for combinatorial and geometric computing , 1997, CACM.
[36] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[37] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.