Trust-preserving set operations
暂无分享,去创建一个
Jonathan Katz | Samrat Bhattacharjee | Peter J. Keleher | Ruggero Morselli | Jonathan Katz | P. Keleher | S. Bhattacharjee | Ruggero Morselli
[1] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[2] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[3] Michael T. Goodrich,et al. Authenticated Data Structures for Graph and Geometric Searching , 2003, CT-RSA.
[4] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[5] M. Goodrich,et al. Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .
[6] Shai Halevi,et al. Secure Hash-and-Sign Signatures Without the Random Oracle , 1999, EUROCRYPT.
[7] C. Appledorn. The Entropy of a Poisson Distribution , 1987 .
[8] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[9] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[10] Vijay Gopalakrishnan,et al. Efficient Peer-To-Peer Searches Using Result-Caching , 2003, IPTPS.
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[13] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[14] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[15] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[16] Jean-Sébastien Coron,et al. Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme , 2000, EUROCRYPT.
[17] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[18] Michael T. Goodrich,et al. An Efficient Dynamic and Distributed Cryptographic Accumulator , 2002, ISC.
[19] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.