Providing Authentication and Integrity in Outsourced Databases using Merkle Hash Tree ’ s
暂无分享,去创建一个
[1] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[2] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[3] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[4] M. Goodrich,et al. Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .
[5] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[6] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[7] Paul C. Kocher. On Certificate Revocation and Validation , 1998, Financial Cryptography.
[8] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.