A symmetric cryptographic scheme for data integrity verification in cloud databases
From MaRDI portal
Publication:781030
DOI10.1016/j.ins.2017.09.033zbMath1436.68088OpenAlexW2756359188MaRDI QIDQ781030
Michele Colajanni, Mauro Andreolini, Luca Ferretti, Mirco Marchetti
Publication date: 16 July 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.09.033
Database theory (68P15) Cryptography (94A60) Data structures (68P05) Authentication, digital signatures and secret sharing (94A62)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the Lambert \(w\) function
- Compressed bloom filters
- Verifiable Computation over Large Database with Incremental Updates
- The complexity of online memory checking
- Keying Hash Functions for Message Authentication
- Fast accumulated hashing
- Network Applications of Bloom Filters: A Survey
- Reconsidering Generic Composition
- Probability and Computing
- Space/time trade-offs in hash coding with allowable errors
- Topics in Cryptology – CT-RSA 2005