The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase hash-tree (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-2004 (17) 2005-2007 (23) 2008-2009 (15) 2010-2015 (15) 2016-2019 (16) 2020-2023 (16)
Publication types (Num. hits)
article(32) inproceedings(70)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 67 occurrences of 55 keywords

Results
Found 102 publication records. Showing 102 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
58Ahto Buldas, Aivo Jürgenson Does Secure Time-Stamping Imply Collision-Free Hash Functions? Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash tree, performance, integrity, consistency, disk
46Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Marc Fischlin Fast Verification of Hash Chains. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hash tree, Hash function, Certificate, hash chain
46Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. Search on Bibsonomy EUC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key infrastructure, Certificate revocation, Merkle hash tree
35Hans-Peter Kriegel, Michael Schiwietz Performance Comparison of Point and Spatial Access Methods. Search on Bibsonomy SSD The full citation details ... 1989 DBLP  DOI  BibTeX  RDF spatial database systems, access methods, performance comparison
34David Bauer, Douglas M. Blough, David Cash Minimal information disclosure with efficiently verifiable credentials. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree
33Dan Williams, Emin Gün Sirer Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 Authenticating Query Results in Data Publishing. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, data publishing, aggregated signature, merkle hash tree
31Ahto Buldas, Margus Niitsoo Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai An Efficient Way to Build Secure Disk. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Jing Deng 0002, Richard Han 0001, Shivakant Mishra Secure code distribution in dynamically programmable wireless sensor networks. Search on Bibsonomy IPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure reprogramming, security, sensor networks
28Ke Xu 0002, Xiaowei Ma, Chunyu Liu A Hash Tree Based Authentication Scheme in SIP Applications. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Sriram Ramabhadran, Sylvia Ratnasamy, Joseph M. Hellerstein, Scott Shenker Brief announcement: prefix hash tree. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data structures, distributed hash tables, range queries
25Martin Boesgaard, Thomas Christensen, Erik Zenner Badger - A Fast and Provably Secure MAC. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tree, MAC, universal hash, pseudo-random generator
25Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Lkhagvadorj Battulga, Sang-Hyun Lee, Aziz Nasridinov, Kwan-Hee Yoo Hash-tree PCA: accelerating PCA with hash-based grouping. Search on Bibsonomy J. Supercomput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Pawel Czarnul, Grzegorz Golaszewski, Grzegorz Jereczek, Maciej Maciejewski Development and benchmarking a parallel Data AcQuisition framework using MPI with hash and hash+tree structures in a cluster environment. Search on Bibsonomy ISPDC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Ahto Buldas, Risto Laanoja Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree
23Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Fabian Stäber, Gerald Kunzmann, Jörg P. Müller Extended Prefix Hash Trees for a distributed phone book application. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal Secure and efficient authentication in Wireless Mesh Networks using merkle trees. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
17Jun Liu 0013 On a Self-Organizing Multipath Routing Protocol in Mobile Wireless Networks. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF source initiated routing, distributed hash tree, mobility, Self-organization, wireless ad hoc networks
17Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu Scalable trusted online dissemination of JPEG2000 images. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Digital signatures, JPEG2000, Merkle hash tree
17Roberto J. Bayardo, Jeffrey S. Sorensen Merkle tree authentication of HTTP responses. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF web content distribution, authenticity, merkle hash tree
15Fangyong Hou, Nong Xiao, Fang Liu 0002, Hongjun He Secure Disk with Authenticated Encryption and IV Verification. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai Efficient disk encryption and verification through trusted nonce. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Henrich Christopher Pöhls Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Caches and Hash Trees for Efficient Memory Integrity Verification. Search on Bibsonomy HPCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Waqar Khalid, Naveed Ahmad 0003, Suleman Khan 0001, Najam U. Saquib, Muhammad Arshad 0001, Duri Shahwar FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15K. Swapna Sudha, N. Jeyanthi Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. Search on Bibsonomy Peer Peer Netw. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15G. Sujatha, R. Jeberson Retna Raj An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Yu-Hsiang Lin, Wen-Chi Shih, Yeim-Kuan Chang Efficient hierarchical hash tree for OpenFlow packet classification with fast updates on GPUs. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Joong-Lyul Lee, Joobum Kim Delay-Aware Hash Tree for Blockchain on Vehicular Delay Tolerant Networks. Search on Bibsonomy WiCON The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Masoud Kaveh, Abolfazl Falahati An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Rahul Mishra 0002, Dharavath Ramesh, Damodar Reddy Edla Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. Search on Bibsonomy Clust. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Kai He, Chunxiao Huang, Jiaoli Shi, Xinrong Hu, Xiying Fan Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain. Search on Bibsonomy Mob. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Lu Rao, Hua Zhang 0001, Tengfei Tu Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Varghese Jensy Babu, M. Victor Jose Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15M. Thangavel, P. Varalakshmi Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15N. Deepa, Perumal Pandiaraja Hybrid Context Aware Recommendation System for E-Health Care by merkle hash tree from cloud using evolutionary algorithm. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Nashreen Nesa, Indrajit Banerjee Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Shafika Showkat Moni, D. Manivannan 0001 An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs. Search on Bibsonomy ICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15R. Ramya, T. Sasikala An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing. Search on Bibsonomy Soft Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15T. Suriya Praba, V. Meena Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree. Search on Bibsonomy ATIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Wenhua Sun, Xiaojuan Wang, Lei Jin An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jehn-Ruey Jiang, Wei-Sheng Chung Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service. Search on Bibsonomy SOCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Nashreen Nesa, Indrajit Banerjee A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography. Search on Bibsonomy ACSS (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Hamed Tohidi, Vahid Tabataba Vakili Lightweight authentication scheme for smart grid using Merkle hash tree and lossless compression hybrid method. Search on Bibsonomy IET Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Guipeng Zhang, Pinghua Chen 一种混合云环境下基于Merkle哈希树的数据安全去重方案 (Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments). Search on Bibsonomy 计算机科学 The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Ping Bai, Wei Zhang, Xu An Wang 0001, Yudong Liu, Haibin Yang, Chun Shan Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. Search on Bibsonomy EIDWT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Saru Vig, Siew-Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay Rapid detection of rowhammer attacks using dynamic skewed hash tree. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Ahto Buldas, Risto Laanoja, Ahto Truu Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world. Search on Bibsonomy Int. J. Serv. Technol. Manag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Neenu Garg, Seema Bawa RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Virendra Kumar, Jonathan Petit, William Whyte Binary Hash Tree based Certificate Access Management. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
15Raasi Manasa Annavajjala, Vijay Anand Partition based hash tree - An efficient certificate revocation system. Search on Bibsonomy EIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Wenwen Li, Bingyi Zhang, Guozheng Rao, Renhai Chen, Zhiyong Feng 0002 Hash Tree Indexing for Fast SPARQL Query in Large Scale RDF Data Management Systems. Search on Bibsonomy ISWC (Posters, Demos & Industry Tracks) The full citation details ... 2017 DBLP  BibTeX  RDF
15Virendra Kumar, Jonathan Petit, William Whyte Binary hash tree based certificate access management for connected vehicles. Search on Bibsonomy WISEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jing Zou, Yunchuan Sun, Shixian Li Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree. Search on Bibsonomy IIKI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Muhammad Saqib Niaz, Gunter Saake Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data. Search on Bibsonomy GvD The full citation details ... 2015 DBLP  BibTeX  RDF
15Fei Chen 0003, Tao Xiang 0001, Jianyong Chen, Wei Yu 0002, Xinwen Fu, Shengyu Zhang 0002 A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. Search on Bibsonomy CBD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Daojing He, Sammy Chan, Shaohua Tang, Mohsen Guizani Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yoonsik Tak, Seungmin Rho, Eenjun Hwang, Hanku Lee Tertiary hash tree-based index structure for high dimensional multimedia data. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Vijay Ram Ghorpade, Yashwant V. Joshi, Ramchandra R. Manthalkar Optimally-balanced Hash Tree Generation in Ad Hoc Networks. Search on Bibsonomy Afr. J. Inf. Commun. Technol. The full citation details ... 2011 DBLP  BibTeX  RDF
15Yoonsik Tak, Eenjun Hwang Tertiary Hash Tree: Indexing Structure for Content-Based Image Retrieval. Search on Bibsonomy ICPR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu 0002, Guangjun Zhong Incremental hash tree for disk authentication. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Abdulhadi Shoufan An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme. Search on Bibsonomy ARC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Abdulhadi Shoufan, Nico Huber A fast hash tree generator for Merkle signature scheme. Search on Bibsonomy ISCAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Iuon-Chang Lin, Chia-Chang Sung An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF source authentication, multicast, efficient
15Veronika Kondratieva, Seung-Woo Seo Optimized Hash Tree for Authentication in Sensor Networks. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Hong Zhang, Lei Han, Yu-Lu Li Design of Hash-Tree Anti-collision Algorithm. Search on Bibsonomy ICNC (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Helger Lipmaa On Optimal Hash Tree Traversal for Interval Time-Stamping. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
15Helger Lipmaa On Optimal Hash Tree Traversal for Interval Time-Stamping. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF interval time-stamping, Laplace's method for integrals, Analysis of algorithms, tree traversal, implementation complexity
15Ekow J. Otoo Balanced Multidimensional Extendible Hash Tree. Search on Bibsonomy PODS The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
13Tingjian Ge, Stanley B. Zdonik Light-Weight, Runtime Verification of Query Sources. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Dmitrij Lagutin, Sasu Tarkoma Public Key Signatures and Lightweight Security Solutions in a Wireless Environment. Search on Bibsonomy NEW2AN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless networks, Network security, public key cryptography, hash chains
13Minghua Zhang, Wynne Hsu, Mong-Li Lee Mining Prevalence-Based Ratio Patterns. Search on Bibsonomy ICTAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Jing Deng 0002, Richard Han 0001, Shivakant Mishra Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng Query Assurance Verification for Dynamic Outsourced XML Databases. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Yuzhe Tang, Shuigeng Zhou LHT: A Low-Maintenance Indexing Scheme over DHTs. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Qingbo Zhu, Windsor W. Hsu Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. Search on Bibsonomy SIGMOD Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
8Markus Rückert Verifiably Encrypted Signatures from RSA without NIZKs. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online contract signing, RSA, Merkle hash trees
8Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Tiancheng Li, Xiaonan Ma, Ninghui Li WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Kui Ren 0001, Wenjing Lou, Kai Zeng 0001, Patrick J. Moran On Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Kui Ren 0001, Wenjing Lou, Yanchao Zhang Multi-user Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution
8Kui Ren 0001, Kai Zeng 0001, Wenjing Lou, Patrick J. Moran On Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy WASA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Gerome Miklau, Dan Suciu Implementing a Tamper-Evident Database System. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
8Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano CERVANTES - A Certificate Validation Test-Bed. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
8Jose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès Reducing the Communication Overhead of an Offline Revocation Dictionary. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 102 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license