Managing Integrity for Data Exchanged on the Web
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[4] Donald E. Eastlake,et al. XML-Signature Syntax and Processing , 2001, RFC.
[5] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[6] Silvio Micali,et al. Transitive Signature Schemes , 2002, CT-RSA.
[7] Sanjeev Khanna,et al. Edinburgh Research Explorer On the Propagation of Deletions and Annotations through Views , 2013 .
[8] Dan Suciu,et al. Modeling Integrity in Data Exchange , 2004, Secure Data Management.
[9] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[10] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[13] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Jennifer Widom,et al. Practical lineage tracing in data warehouses , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).
[16] R. Ostrovsky,et al. Efficient Consistency Proofs on a Committed Database , 2003 .
[17] Elisa Bertino,et al. An infrastructure for managing secure update operations on XML data , 2003, SACMAT '03.
[18] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[19] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[20] Peter Stañski,et al. Content extraction signatures using XML digital signatures and custom transforms on-demand , 2003, WWW '03.