Authenticated hash tables based on cryptographic accumulators (Q262258): Difference between revisions
From MaRDI portal
Created a new Item |
Changed an Item |
||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 68P05 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A62 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6560724 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
authenticated data structures | |||
Property / zbMATH Keywords: authenticated data structures / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
cryptographic accumulators | |||
Property / zbMATH Keywords: cryptographic accumulators / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
cloud computing security | |||
Property / zbMATH Keywords: cloud computing security / rank | |||
Normal rank |
Revision as of 14:41, 27 June 2023
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Authenticated hash tables based on cryptographic accumulators |
scientific article |
Statements
Authenticated hash tables based on cryptographic accumulators (English)
0 references
29 March 2016
0 references
authenticated data structures
0 references
cryptographic accumulators
0 references
cloud computing security
0 references