Super-Efficient Verification of Dynamic Outsourced Databases
From MaRDI portal
Publication:5458954
DOI10.1007/978-3-540-79263-5_26zbMath1153.68368OpenAlexW2161915070MaRDI QIDQ5458954
Nikos Triandopoulos, Roberto Tamassia, Michael T. Goodrich
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_26
Database theory (68P15) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Database Outsourcing with Hierarchical Authenticated Data Structures ⋮ Secure Authenticated Comparisons ⋮ Efficient authenticated data structures for graph connectivity and geometric search problems ⋮ Authenticated hash tables based on cryptographic accumulators
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Checking the correctness of memories
- A general model for authenticated data structures
- Efficient Content Authentication in Peer-to-Peer Networks
- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
- Automata, Languages and Programming
- Automata, Languages and Programming
- Data and Applications Security XIX