Author:
Berman Piotr,Karpinski Marek,Nekrich Yakov
Subject
General Computer Science,Theoretical Computer Science
Reference16 articles.
1. Merkle tree authentication in UDDI registries;Bertino;Int. J. Web Service Res.,2004
2. Almost optimal hash sequence traversal;Coppersmith;Finan. Cryptogr.,2002
3. P. Devanbu, M. Gertz, C. Martel, S.G. Stublebine, Authentic third party data publication, in: 14th IFIP Workshop on Database Security, 2000
4. M. Jakobsson, Fractal hash sequence representation and traversal, in: Proc. ISIT, 2002, p. 437
5. M. Jakobsson, T. Leighton, S. Micali, M. Szydlo, Fractal Merkle tree representation and traversal, in: RSA Cryptographers Track, RSA Security Conference, 2003
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献