Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
58 | Ahto Buldas, Aivo Jürgenson |
Does Secure Time-Stamping Imply Collision-Free Hash Functions? |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 |
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
hash tree, performance, integrity, consistency, disk |
46 | Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He |
Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Marc Fischlin |
Fast Verification of Hash Chains. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Hash tree, Hash function, Certificate, hash chain |
46 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu |
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. |
EUC |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Certificate revocation system implementation based on the Merkle hash tree. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Public-key infrastructure, Certificate revocation, Merkle hash tree |
35 | Hans-Peter Kriegel, Michael Schiwietz |
Performance Comparison of Point and Spatial Access Methods. |
SSD |
1989 |
DBLP DOI BibTeX RDF |
spatial database systems, access methods, performance comparison |
34 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
33 | Dan Williams, Emin Gün Sirer |
Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. |
NCA |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 |
Authenticating Query Results in Data Publishing. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
authentication, data publishing, aggregated signature, merkle hash tree |
31 | Ahto Buldas, Margus Niitsoo |
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai |
An Efficient Way to Build Secure Disk. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Secure code distribution in dynamically programmable wireless sensor networks. |
IPSN |
2006 |
DBLP DOI BibTeX RDF |
secure reprogramming, security, sensor networks |
28 | Ke Xu 0002, Xiaowei Ma, Chunyu Liu |
A Hash Tree Based Authentication Scheme in SIP Applications. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sriram Ramabhadran, Sylvia Ratnasamy, Joseph M. Hellerstein, Scott Shenker |
Brief announcement: prefix hash tree. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
data structures, distributed hash tables, range queries |
25 | Martin Boesgaard, Thomas Christensen, Erik Zenner |
Badger - A Fast and Provably Secure MAC. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
tree, MAC, universal hash, pseudo-random generator |
25 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Lkhagvadorj Battulga, Sang-Hyun Lee, Aziz Nasridinov, Kwan-Hee Yoo |
Hash-tree PCA: accelerating PCA with hash-based grouping. |
J. Supercomput. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Pawel Czarnul, Grzegorz Golaszewski, Grzegorz Jereczek, Maciej Maciejewski |
Development and benchmarking a parallel Data AcQuisition framework using MPI with hash and hash+tree structures in a cluster environment. |
ISPDC |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Ahto Buldas, Risto Laanoja |
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao |
A flexible and scalable authentication scheme for JPEG2000 image codestreams. |
ACM Multimedia |
2003 |
DBLP DOI BibTeX RDF |
message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree |
23 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey |
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Fabian Stäber, Gerald Kunzmann, Jörg P. Müller |
Extended Prefix Hash Trees for a distributed phone book application. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal |
Secure and efficient authentication in Wireless Mesh Networks using merkle trees. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction |
17 | Jun Liu 0013 |
On a Self-Organizing Multipath Routing Protocol in Mobile Wireless Networks. |
J. Netw. Syst. Manag. |
2006 |
DBLP DOI BibTeX RDF |
source initiated routing, distributed hash tree, mobility, Self-organization, wireless ad hoc networks |
17 | Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu |
Scalable trusted online dissemination of JPEG2000 images. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Digital signatures, JPEG2000, Merkle hash tree |
17 | Roberto J. Bayardo, Jeffrey S. Sorensen |
Merkle tree authentication of HTTP responses. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
web content distribution, authenticity, merkle hash tree |
15 | Fangyong Hou, Nong Xiao, Fang Liu 0002, Hongjun He |
Secure Disk with Authenticated Encryption and IV Verification. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai |
Efficient disk encryption and verification through trusted nonce. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Henrich Christopher Pöhls |
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li |
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Caches and Hash Trees for Efficient Memory Integrity Verification. |
HPCA |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Waqar Khalid, Naveed Ahmad 0003, Suleman Khan 0001, Najam U. Saquib, Muhammad Arshad 0001, Duri Shahwar |
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
15 | K. Swapna Sudha, N. Jeyanthi |
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. |
Peer Peer Netw. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | G. Sujatha, R. Jeberson Retna Raj |
An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Hsiang Lin, Wen-Chi Shih, Yeim-Kuan Chang |
Efficient hierarchical hash tree for OpenFlow packet classification with fast updates on GPUs. |
J. Parallel Distributed Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Joong-Lyul Lee, Joobum Kim |
Delay-Aware Hash Tree for Blockchain on Vehicular Delay Tolerant Networks. |
WiCON |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Masoud Kaveh, Abolfazl Falahati |
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication. |
Frontiers Inf. Technol. Electron. Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Rahul Mishra 0002, Dharavath Ramesh, Damodar Reddy Edla |
Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. |
Clust. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Kai He, Chunxiao Huang, Jiaoli Shi, Xinrong Hu, Xiying Fan |
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain. |
Mob. Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Lu Rao, Hua Zhang 0001, Tengfei Tu |
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. |
IEEE Trans. Serv. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Varghese Jensy Babu, M. Victor Jose |
Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking. |
Wirel. Pers. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | M. Thangavel, P. Varalakshmi |
Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage. |
IEEE Trans. Knowl. Data Eng. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | N. Deepa, Perumal Pandiaraja |
Hybrid Context Aware Recommendation System for E-Health Care by merkle hash tree from cloud using evolutionary algorithm. |
Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Nashreen Nesa, Indrajit Banerjee |
Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT. |
Trans. Comput. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shafika Showkat Moni, D. Manivannan 0001 |
An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs. |
ICC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | R. Ramya, T. Sasikala |
An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing. |
Soft Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | T. Suriya Praba, V. Meena |
Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree. |
ATIS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Wenhua Sun, Xiaojuan Wang, Lei Jin |
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint. |
HPCC/SmartCity/DSS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Jehn-Ruey Jiang, Wei-Sheng Chung |
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service. |
SOCA |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Nashreen Nesa, Indrajit Banerjee |
A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography. |
ACSS (2) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Hamed Tohidi, Vahid Tabataba Vakili |
Lightweight authentication scheme for smart grid using Merkle hash tree and lossless compression hybrid method. |
IET Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Guipeng Zhang, Pinghua Chen |
一种混合云环境下基于Merkle哈希树的数据安全去重方案 (Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments). |
计算机科学 |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ping Bai, Wei Zhang, Xu An Wang 0001, Yudong Liu, Haibin Yang, Chun Shan |
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. |
EIDWT |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Saru Vig, Siew-Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay |
Rapid detection of rowhammer attacks using dynamic skewed hash tree. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ahto Buldas, Risto Laanoja, Ahto Truu |
Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world. |
Int. J. Serv. Technol. Manag. |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Neenu Garg, Seema Bawa |
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. |
J. Netw. Comput. Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Virendra Kumar, Jonathan Petit, William Whyte |
Binary Hash Tree based Certificate Access Management. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
15 | Raasi Manasa Annavajjala, Vijay Anand |
Partition based hash tree - An efficient certificate revocation system. |
EIT |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Wenwen Li, Bingyi Zhang, Guozheng Rao, Renhai Chen, Zhiyong Feng 0002 |
Hash Tree Indexing for Fast SPARQL Query in Large Scale RDF Data Management Systems. |
ISWC (Posters, Demos & Industry Tracks) |
2017 |
DBLP BibTeX RDF |
|
15 | Virendra Kumar, Jonathan Petit, William Whyte |
Binary hash tree based certificate access management for connected vehicles. |
WISEC |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jing Zou, Yunchuan Sun, Shixian Li |
Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree. |
IIKI |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen |
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. |
IEEE Trans. Computers |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Saqib Niaz, Gunter Saake |
Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data. |
GvD |
2015 |
DBLP BibTeX RDF |
|
15 | Fei Chen 0003, Tao Xiang 0001, Jianyong Chen, Wei Yu 0002, Xinwen Fu, Shengyu Zhang 0002 |
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. |
CBD |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen |
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
15 | Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu |
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
15 | Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu |
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. |
ProvSec |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Daojing He, Sammy Chan, Shaohua Tang, Mohsen Guizani |
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. |
IEEE Trans. Wirel. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yoonsik Tak, Seungmin Rho, Eenjun Hwang, Hanku Lee |
Tertiary hash tree-based index structure for high dimensional multimedia data. |
Multim. Tools Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Vijay Ram Ghorpade, Yashwant V. Joshi, Ramchandra R. Manthalkar |
Optimally-balanced Hash Tree Generation in Ad Hoc Networks. |
Afr. J. Inf. Commun. Technol. |
2011 |
DBLP BibTeX RDF |
|
15 | Yoonsik Tak, Eenjun Hwang |
Tertiary Hash Tree: Indexing Structure for Content-Based Image Retrieval. |
ICPR |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu 0002, Guangjun Zhong |
Incremental hash tree for disk authentication. |
ISCC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Abdulhadi Shoufan |
An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme. |
ARC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Abdulhadi Shoufan, Nico Huber |
A fast hash tree generator for Merkle signature scheme. |
ISCAS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Iuon-Chang Lin, Chia-Chang Sung |
An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
source authentication, multicast, efficient |
15 | Veronika Kondratieva, Seung-Woo Seo |
Optimized Hash Tree for Authentication in Sensor Networks. |
IEEE Commun. Lett. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Hong Zhang, Lei Han, Yu-Lu Li |
Design of Hash-Tree Anti-collision Algorithm. |
ICNC (5) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Helger Lipmaa |
On Optimal Hash Tree Traversal for Interval Time-Stamping. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
15 | Helger Lipmaa |
On Optimal Hash Tree Traversal for Interval Time-Stamping. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
interval time-stamping, Laplace's method for integrals, Analysis of algorithms, tree traversal, implementation complexity |
15 | Ekow J. Otoo |
Balanced Multidimensional Extendible Hash Tree. |
PODS |
1986 |
DBLP DOI BibTeX RDF |
|
13 | Tingjian Ge, Stanley B. Zdonik |
Light-Weight, Runtime Verification of Query Sources. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Dmitrij Lagutin, Sasu Tarkoma |
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment. |
NEW2AN |
2009 |
DBLP DOI BibTeX RDF |
wireless networks, Network security, public key cryptography, hash chains |
13 | Minghua Zhang, Wynne Hsu, Mong-Li Lee |
Mining Prevalence-Based Ratio Patterns. |
ICTAI (2) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks. |
PerCom Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng |
Query Assurance Verification for Dynamic Outsourced XML Databases. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Yuzhe Tang, Shuigeng Zhou |
LHT: A Low-Maintenance Indexing Scheme over DHTs. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Qingbo Zhu, Windsor W. Hsu |
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. |
SIGMOD Conference |
2005 |
DBLP DOI BibTeX RDF |
|
8 | Markus Rückert |
Verifiably Encrypted Signatures from RSA without NIZKs. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Online contract signing, RSA, Merkle hash trees |
8 | Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou |
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Tiancheng Li, Xiaonan Ma, Ninghui Li |
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Kui Ren 0001, Wenjing Lou, Kai Zeng 0001, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
8 | Kui Ren 0001, Wenjing Lou, Yanchao Zhang |
Multi-user Broadcast Authentication in Wireless Sensor Networks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
8 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. |
STC |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
8 | Kui Ren 0001, Kai Zeng 0001, Wenjing Lou, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. |
WASA |
2006 |
DBLP DOI BibTeX RDF |
|
8 | Gerome Miklau, Dan Suciu |
Implementing a Tamper-Evident Database System. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
|
8 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
CERVANTES - A Certificate Validation Test-Bed. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès |
Reducing the Communication Overhead of an Offline Revocation Dictionary. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
|