Author:
Narasimha Maithili,Tsudik Gene
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography and application to virus protection. In: 27th Annual Symposium of Theory of Computing (1995)
2. Lecture Notes in Computer Science;M. Bellare,1999
3. Lecture Notes in Computer Science;D. Boneh,2003
4. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: 14th IFIP Working Conference in Database Security (2000)
5. Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: SIGMOD (2002)
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain;IEEE Transactions on Knowledge and Data Engineering;2024-07
2. Parallel Integrity Authentication Data Structure Construction for Encrypted Range Queries;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
3. Towards Merkle Trees for High-Performance Data Systems;Proceedings of the 1st Workshop on Verifiable Database Systems;2023-06-23
4. Blockchain based integrity assurance framework for COVID‐19 information management & decision making at National Command Operation Center, Pakistan;Concurrency and Computation: Practice and Experience;2023-01-24
5. Enabling Verifiable Single-Attribute Range Queries on Erasure-Coded Sharding-Based Blockchain Systems;Web Information Systems and Applications;2022