Database Outsourcing with Hierarchical Authenticated Data Structures
From MaRDI portal
Publication:3193277
DOI10.1007/978-3-319-12160-4_23zbMath1445.68079OpenAlexW73278470MaRDI QIDQ3193277
Mohammad Etemad, Alptekin Küpçü
Publication date: 16 October 2015
Published in: Information Security and Cryptology -- ICISC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-12160-4_23
Database theory (68P15) Data structures (68P05) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Authenticated hash tables based on cryptographic accumulators
- A general model for authenticated data structures
- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
- Super-Efficient Verification of Dynamic Outsourced Databases
- Data and Applications Security XIX
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Database Outsourcing with Hierarchical Authenticated Data Structures