Verified Query Results from Hybrid Authentication Trees
暂无分享,去创建一个
[1] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[2] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[3] Peeter Laud,et al. Eliminating Counterevidence with Applications to Accountable Certificate Management , 2002, J. Comput. Secur..
[4] Tomas Sander,et al. Efficient Accumulators without Trapdoor Extended Abstracts , 1999, ICICS.
[5] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[6] Kaisa Nyberg,et al. Fast Accumulated Hashing , 1996, FSE.
[7] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[8] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[9] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[10] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[11] Mary Baker,et al. Enabling the Archival Storage of Signed Documents , 2002, FAST.
[12] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[13] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[14] Vijay Varadharajan,et al. Information and Communication Security , 1999, Lecture Notes in Computer Science.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[17] Rafail Ostrovsky,et al. Efficient Consistency Proofs for Generalized Queries on a Committed Database , 2004, ICALP.
[18] Elisa Bertino,et al. Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.
[19] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[20] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[21] Michael T. Goodrich,et al. Authenticated Data Structures for Graph and Geometric Searching , 2003, CT-RSA.
[22] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[23] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[24] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..