A new family of authentication protocols
ACM SIGOPS Operating Systems Review
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Secure Publishing of XML Documents
EDBT '02 Proceedings of the Worshops XMLDM, MDDE, and YRWS on XML-Based Data Management and Multimedia Engineering-Revised Papers
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Directed Acyclic Graphs, One-way Functions and Digital Signatures
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature Scheme with Bounded Life-Span
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Improved Efficient Arguments (Preliminary Version)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
New Generation of Secure and Practical RSA-Based Signatures
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Min-round Resettable Zero-Knowledge in the Public-Key Model
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
ISW '99 Proceedings of the Second International Workshop on Information Security
Weighted One-Way Hash Chain and Its Applications
ISW '00 Proceedings of the Third International Workshop on Information Security
Persistent Authenticated Dictionaries and Their Applications
ISC '01 Proceedings of the 4th International Conference on Information Security
An Efficient Dynamic and Distributed Cryptographic Accumulator
ISC '02 Proceedings of the 5th International Conference on Information Security
One-Way Cross-Trees and Their Applications
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
How to construct optimal one-time signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Flexible authentication of XML documents
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems
Proceedings of the 2005 workshop on Secure web services
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Secure acknowledgment aggregation and multisignatures with limited robustness
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web dynamics
Three architectures for trusted data dissemination in edge computing
Data & Knowledge Engineering - Special issue: ER 2004
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
ID-based cryptography using symmetric primitives
Designs, Codes and Cryptography
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
CADS: continuous authentication on data streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Proof-infused streams: enabling authentication of sliding window queries on streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Verifying Completeness of Relational Query Answers from Online Servers
ACM Transactions on Information and System Security (TISSEC)
Providing freshness guarantees for outsourced databases
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Ensuring correctness over untrusted private database
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Integrity checking in cryptographic file systems with constant trusted storage
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
StoreGPU: exploiting graphics processing units to accelerate distributed storage systems
HPDC '08 Proceedings of the 17th international symposium on High performance distributed computing
ACM Transactions on Sensor Networks (TOSN)
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
A one-time signature using run-length encoding
Information Processing Letters
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
Merkle Signatures with Virtually Unlimited Signature Capacity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
On Kabatianskii-Krouk-Smeets Signatures
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Succinct NP Proofs from an Extractability Assumption
CiE '08 Proceedings of the 4th conference on Computability in Europe: Logic and Theory of Algorithms
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network
ICCSA '08 Proceeding sof the international conference on Computational Science and Its Applications, Part I
Fast Hash-Based Signatures on Constrained Devices
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Athos: Efficient Authentication of Outsourced File Systems
ISC '08 Proceedings of the 11th international conference on Information Security
Authenticating the query results of text search engines
Proceedings of the VLDB Endowment
Proceedings of the 15th ACM conference on Computer and communications security
Minimal information disclosure with efficiently verifiable credentials
Proceedings of the 4th ACM workshop on Digital identity management
Efficient integrity checking of untrusted network storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Merkle Tree Traversal Revisited
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Digital Signatures Out of Second-Preimage Resistant Hash Functions
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Hash Functions from Sigma Protocols and Improvements to VSH
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Query assurance verification for outsourced multi-dimensional databases
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Securing Layer-2 Path Selection in Wireless Mesh Networks
Information Security Applications
Public Key Authentication with Memory Tokens
Information Security Applications
Realizing Hash-and-Sign Signatures under Standard Assumptions
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Advanced Internet Based Systems and Applications
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A security plane for publish/subscribe based content oriented networks
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Continuous Spatial Authentication
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
On GPU's viability as a middleware accelerator
Cluster Computing
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Redactable signatures on data with dependencies and their application to personal health records
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Scalable verification for outsourced dynamic databases
Proceedings of the VLDB Endowment
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Another Glance at Double-Length Hashing
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Verifiably Encrypted Signatures from RSA without NIZKs
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Reliable and secure broadcast communication over resource constrained systems
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Performance of broadcast authentication for secure V2V safety applications: a holistic view
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
How to authenticate graphs without leaking
Proceedings of the 13th International Conference on Extending Database Technology
FastAD: an authenticated directory for billions of objects
ACM SIGOPS Operating Systems Review
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Authenticated dictionaries for fresh attribute credentials
iTrust'03 Proceedings of the 1st international conference on Trust management
Privacy-preserving credentials upon trusted computing augmented servers
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Fractal Merkle tree representation and traversal
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Authenticated relational tables and authenticated skip lists
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Cryptanalysis of a hash function proposed at ICISC 2006
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
A hybrid approach for authenticating MPEG-2 streaming data
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Domain extension of public random functions: beyond the birthday Barrier
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Fast digital signature algorithm based on subgraph isomorphism
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Seven-property-preserving iterated hashing: ROX
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Time and space efficient algorithms for two-party authenticated data structures
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Super-efficient verification of dynamic outsourced databases
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Healthcom'09 Proceedings of the 11th international conference on e-Health networking, applications and services
Asymptotically efficient lattice-based digital signatures
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Provably secure framework for information aggregation in sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Authentic time-stamps for archival storage
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
A GPU accelerated storage system
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Performance of two one-time signature schemes in space/time constrained environments
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
A collaborative monitoring mechanism for making a multitenant platform accountable
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Query racing: fast completeness certification of query results
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A message recognition protocol based on standard assumptions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Preimage attacks against variants of very smooth hash
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Optimal authenticated data structures with multilinear forms
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
One-time signatures and Chameleon hash functions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Automated forensic fingerprint analysis: a novel generic process model and container format
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
The equivalence of the random oracle model and the ideal cipher model, revisited
Proceedings of the forty-third annual ACM symposium on Theory of computing
A web services based architecture for digital time stamping
Journal of Web Engineering
Authenticated Dictionaries: Real-World Costs and Trade-Offs
ACM Transactions on Information and System Security (TISSEC)
On the security of the Winternitz one-time signature scheme
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
On obfuscating programs with tamper-proof hardware
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Optimal verification of operations on dynamic sets
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
How to tell if your cloud files are vulnerable to drive crashes
Proceedings of the 18th ACM conference on Computer and communications security
Efficient fail-stop signatures from the factoring assumption
ISC'11 Proceedings of the 14th international conference on Information security
Authentication of range query results in mapreduce environments
Proceedings of the third international workshop on Cloud data management
APR-Quad: an update efficient authenticated dictionary for spatial data
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Implementing a tamper-evident database system
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Self-Updating hash chains and their implementations
WISE'06 Proceedings of the 7th international conference on Web Information Systems
CMSS: an improved merkle signature scheme
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
An efficient authentication and simplified certificate status management for personal area networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Updatable zero-knowledge databases
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient dos resistant multicast authentication schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Single-key AIL-MACs from any FIL-MAC
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Information Sciences: an International Journal
Key establishment and authentication mechanism for secure sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Reliable broadcast message authentication in wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
An FPGA accelerator for hash tree generation in the merkle signature scheme
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Efficient certificate revocation system implementation: Huffman Merkle Hash Tree (HuffMHT)
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Leakage-free redactable signatures
Proceedings of the second ACM conference on Data and Application Security and Privacy
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A robust multisignature scheme with applications to acknowledgement aggregation
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Web data protection: principles and research issues
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Efficient cooperative signatures: a novel authentication scheme for sensor networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Authenticating query results in data publishing
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Multi-Source stream authentication framework in case of composite MPEG-4 stream
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Using automated banking certificates to detect unauthorised financial transactions
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Confidentiality enforcement for XML outsourced data
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Public-key encryption with non-interactive opening: new constructions and stronger definitions
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
Transactions on Computational Science VI
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Achieving multicast stream authentication using MDS codes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
A smart card implementation of the mceliece PKC
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Generalizations and extensions of redactable signatures with applications to electronic healthcare
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Hash based digital signature schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Domain expansion of MACs: alternative uses of the FIL-MAC
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Parallelizable authentication trees
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Security analysis on digital signature function implemented in PDF software
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
XMSS - a practical forward secure signature scheme based on minimal security assumptions
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
The symbiosis between collision and preimage resistance
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Authenticating location-based services without compromising location privacy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Private data deduplication protocols in cloud storage
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Efficient verification of web-content searching through authenticated web crawlers
Proceedings of the VLDB Endowment
Toward revocation data handling efficiency in VANETs
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
HORSIC: An efficient one-time signature scheme for wireless sensor networks
Information Processing Letters
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Data forensics constructions from cryptographic hashing and coding
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Authentication of moving range queries
Proceedings of the 21st ACM international conference on Information and knowledge management
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Signatures of correct computation
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
On the security of the Winternitz one-time signature scheme
International Journal of Applied Cryptography
Embassies: radically refactoring the web
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Verifying correctness of inner product of vectors in cloud computing
Proceedings of the 2013 international workshop on Security in cloud computing
Practical dynamic proofs of retrievability
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Customer-centric energy usage data management and sharing in smart grid systems
Proceedings of the first ACM workshop on Smart energy grid security
Authenticated data structures, generically
Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
Security of graph data: hashing schemes and definitions
Proceedings of the 4th ACM conference on Data and application security and privacy
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
Computer Standards & Interfaces
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs
Mobile Information Systems
Hi-index | 0.00 |