[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/646118.758638guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Authentic Third-party Data Publication

Published: 21 August 2000 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
August 2000
466 pages

Publisher

Kluwer, B.V.

Netherlands

Publication History

Published: 21 August 2000

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)CVEMProceedings of the 2018 International Conference on Cloud Computing and Internet of Things10.1145/3291064.3291073(80-85)Online publication date: 29-Oct-2018
  • (2017)UshareProceedings of the 11th International Conference on Ubiquitous Information Management and Communication10.1145/3022227.3022325(1-6)Online publication date: 5-Jan-2017
  • (2017)Verifiable outsourced database in the cloud using game theoryProceedings of the Symposium on Applied Computing10.1145/3019612.3019628(370-377)Online publication date: 3-Apr-2017
  • (2017)Publicly verifiable databases with efficient insertion/deletion operationsJournal of Computer and System Sciences10.1016/j.jcss.2016.07.00586:C(49-58)Online publication date: 1-Jun-2017
  • (2016)Integrity Verification For Outsourced XML Database In Cloud StorageProceedings of the International Conference on Informatics and Analytics10.1145/2980258.2980354(1-5)Online publication date: 25-Aug-2016
  • (2016)Hash First, Argue LaterProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978368(1304-1316)Online publication date: 24-Oct-2016
  • (2016)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and TreesProceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 984110.1007/978-3-319-44618-9_12(216-236)Online publication date: 31-Aug-2016
  • (2015)Practical Techniques Building on Encryption for Protecting and Managing Data in the CloudLNCS Essays on The New Codebreakers - Volume 910010.1007/978-3-662-49301-4_15(205-239)Online publication date: 1-Nov-2015
  • (2014)Authenticated data structures, genericallyACM SIGPLAN Notices10.1145/2578855.253585149:1(411-423)Online publication date: 8-Jan-2014
  • (2014)Authenticated data structures, genericallyProceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages10.1145/2535838.2535851(411-423)Online publication date: 11-Jan-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media