ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Streaming Authenticated Data Structures
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security - CCSW '14
◽
10.1145/2664168.2664177
◽
2014
◽
Cited By ~ 4
Author(s):
Yi Qian
◽
Yupeng Zhang
◽
Xi Chen
◽
Charalampos Papamanthou
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Related Documents
Cited By
References
Authenticated data structures, generically
ACM SIGPLAN Notices
◽
10.1145/2578855.2535851
◽
2014
◽
Vol 49
(1)
◽
pp. 411-423
◽
Cited By ~ 11
Author(s):
Andrew Miller
◽
Michael Hicks
◽
Jonathan Katz
◽
Elaine Shi
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Authenticated Data Structures
Symmetric Cryptographic Protocols
◽
10.1007/978-3-319-07584-6_9
◽
2014
◽
pp. 163-193
Author(s):
Mahalingam Ramkumar
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Authenticated Data Structures
Algorithms - ESA 2003 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-39658-1_2
◽
2003
◽
pp. 2-5
◽
Cited By ~ 69
Author(s):
Roberto Tamassia
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Optimal Authenticated Data Structures with Multilinear Forms
Lecture Notes in Computer Science - Pairing-Based Cryptography - Pairing 2010
◽
10.1007/978-3-642-17455-1_16
◽
2010
◽
pp. 246-264
◽
Cited By ~ 16
Author(s):
Charalampos Papamanthou
◽
Roberto Tamassia
◽
Nikos Triandopoulos
Keyword(s):
Data Structures
◽
Multilinear Forms
◽
Authenticated Data Structures
Download Full-text
Dynamic authenticated data structures with access control for outsourcing data stream
IET Information Security
◽
10.1049/iet-ifs.2015.0243
◽
2017
◽
Vol 11
(5)
◽
pp. 235-242
◽
Cited By ~ 2
Author(s):
Yi Sun
◽
Xingyuan Chen
◽
Xuehui Du
◽
Jian Xu
Keyword(s):
Access Control
◽
Data Structures
◽
Data Stream
◽
Authenticated Data Structures
Download Full-text
Streaming Authenticated Data Structures
Advances in Cryptology – EUROCRYPT 2013 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-38348-9_22
◽
2013
◽
pp. 353-370
◽
Cited By ~ 27
Author(s):
Charalampos Papamanthou
◽
Elaine Shi
◽
Roberto Tamassia
◽
Ke Yi
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2018.01.014
◽
2018
◽
Vol 107
◽
pp. 113-124
◽
Cited By ~ 90
Author(s):
Jian Xu
◽
Laiwen Wei
◽
Yu Zhang
◽
Andi Wang
◽
Fucai Zhou
◽
...
Keyword(s):
Data Structures
◽
Homomorphic Encryption
◽
Fully Homomorphic Encryption
◽
Merkle Tree
◽
Authenticated Data Structures
Download Full-text
Hash Chaining for Authenticated Data Structures Freshness Checking
Biometrics, Computer Security Systems and Artificial Intelligence Applications
◽
10.1007/978-0-387-36503-9_14
◽
2007
◽
pp. 155-164
Author(s):
Eugeniusz Kuriata
◽
Witold Maćków
◽
Paweł Sukiennik
Keyword(s):
Data Structures
◽
Authenticated Data Structures
Download Full-text
A General Model for Authenticated Data Structures
Algorithmica
◽
10.1007/s00453-003-1076-8
◽
2004
◽
Vol 39
(1)
◽
pp. 21-41
◽
Cited By ~ 109
Author(s):
Charles Martel
◽
Glen Nuckolls
◽
Premkumar Devanbu
◽
Michael Gertz
◽
April Kwong
◽
...
Keyword(s):
Data Structures
◽
General Model
◽
Authenticated Data Structures
Download Full-text
Overlay Indexes: Efficiently Supporting Aggregate Range Queries and Authenticated Data Structures in Off-the-Shelf Databases
IEEE Access
◽
10.1109/access.2019.2957346
◽
2019
◽
Vol 7
◽
pp. 175642-175670
◽
Cited By ~ 2
Author(s):
Diego Pennino
◽
Maurizio Pizzonia
◽
Alessio Papi
Keyword(s):
Data Structures
◽
Range Queries
◽
Authenticated Data Structures
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close