ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Dynamic authenticated data structures with access control for outsourcing data stream
IET Information Security
◽
10.1049/iet-ifs.2015.0243
◽
2017
◽
Vol 11
(5)
◽
pp. 235-242
◽
Cited By ~ 2
Author(s):
Yi Sun
◽
Xingyuan Chen
◽
Xuehui Du
◽
Jian Xu
Keyword(s):
Access Control
◽
Data Structures
◽
Data Stream
◽
Authenticated Data Structures
Download Full-text
Related Documents
Cited By
References
FENCE: Continuous access control enforcement in dynamic data stream environments
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)
◽
10.1109/icde.2010.5447899
◽
2010
◽
Cited By ~ 6
Author(s):
Rimma V. Nehme
◽
Hyo-Sang Lim
◽
Elisa Bertino
Keyword(s):
Access Control
◽
Data Stream
◽
Dynamic Data
◽
Continuous Access
Download Full-text
Authenticated data structures, generically
ACM SIGPLAN Notices
◽
10.1145/2578855.2535851
◽
2014
◽
Vol 49
(1)
◽
pp. 411-423
◽
Cited By ~ 11
Author(s):
Andrew Miller
◽
Michael Hicks
◽
Jonathan Katz
◽
Elaine Shi
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Authenticated Data Structures
Symmetric Cryptographic Protocols
◽
10.1007/978-3-319-07584-6_9
◽
2014
◽
pp. 163-193
Author(s):
Mahalingam Ramkumar
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
Advances in Intelligent Systems and Computing - Biologically Inspired Cognitive Architectures (BICA) for Young Scientists
◽
10.1007/978-3-319-63940-6_36
◽
2017
◽
pp. 251-256
Author(s):
Anna Epishkina
◽
Sergey Zapechnikov
Keyword(s):
Access Control
◽
Data Structures
◽
Multidimensional Data
◽
Attribute Based Encryption
◽
Multidimensional Data Structures
Download Full-text
Authenticated Data Structures
Algorithms - ESA 2003 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-39658-1_2
◽
2003
◽
pp. 2-5
◽
Cited By ~ 69
Author(s):
Roberto Tamassia
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Lock-free Data Structures for Data Stream Processing
Datenbank-Spektrum
◽
10.1007/s13222-019-00329-4
◽
2019
◽
Vol 19
(3)
◽
pp. 209-218
Author(s):
Alexander Baumstark
◽
Constantin Pohl
Keyword(s):
Data Structures
◽
Data Stream
◽
Stream Processing
◽
Data Stream Processing
◽
Free Data
Download Full-text
Optimal Authenticated Data Structures with Multilinear Forms
Lecture Notes in Computer Science - Pairing-Based Cryptography - Pairing 2010
◽
10.1007/978-3-642-17455-1_16
◽
2010
◽
pp. 246-264
◽
Cited By ~ 16
Author(s):
Charalampos Papamanthou
◽
Roberto Tamassia
◽
Nikos Triandopoulos
Keyword(s):
Data Structures
◽
Multilinear Forms
◽
Authenticated Data Structures
Download Full-text
Access control for secure distributed data structures in Distributed Hash Tables
2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)
◽
10.1109/lanman.2017.7972147
◽
2017
◽
Author(s):
Read Al-Aaridhi
◽
Ahmed Yueksektepe
◽
Kalman Graffi
Keyword(s):
Access Control
◽
Data Structures
◽
Distributed Data
◽
Distributed Hash Tables
◽
Hash Tables
◽
Distributed Data Structures
Download Full-text
New Access Control for Secure Query Processing over XML Data Stream
2007 International Conference on Convergence Information Technology (ICCIT 2007)
◽
10.1109/iccit.2007.302
◽
2007
◽
Cited By ~ 1
Author(s):
Dong Chan An
◽
Seog Park
Keyword(s):
Access Control
◽
Query Processing
◽
Data Stream
◽
Xml Data
◽
Secure Query Processing
Download Full-text
Streaming Authenticated Data Structures
Advances in Cryptology – EUROCRYPT 2013 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-38348-9_22
◽
2013
◽
pp. 353-370
◽
Cited By ~ 27
Author(s):
Charalampos Papamanthou
◽
Elaine Shi
◽
Roberto Tamassia
◽
Ke Yi
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close