Dynamic authenticated data structures with access control for outsourcing data stream
暂无分享,去创建一个
Jian Xu | Yi Sun | Xingyuan Chen | Xuehui Du | Yi Sun | Xing-yuan Chen | Xuehui Du | Jian Xu
[1] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[2] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[3] Mihir Bellare,et al. Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..
[4] Roberto Tamassia,et al. Authenticated Data Structures , 2003, ESA.
[5] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Hung-Min Sun,et al. A Study of User-Friendly Hash Comparison Schemes , 2009, 2009 Annual Computer Security Applications Conference.
[8] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[9] Stephen S. Yau,et al. Efficient provable data possession for hybrid clouds , 2010, CCS '10.
[10] Roksana Boreli,et al. A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[11] Dominique Schröder,et al. Verifiable data streaming , 2012, CCS '12.
[12] Yuzhe Tang,et al. Outsourcing multi-version key-value stores with verifiable data freshness , 2014, 2014 IEEE 30th International Conference on Data Engineering.