P. T. Devanbu, M. Gertz, C. U. Martel, and S. G. Stubblebine, Authentic Third-Party Data Publication, In: DBSEC, pp.101-112, 2001.
DOI : 10.1007/0-306-47008-X_9

D. Battista, G. Palazzi, and B. , Authenticated Relational Tables and Authenticated Skip Lists, In: DBSEC, vol.2, issue.2, pp.31-46, 2007.
DOI : 10.1007/978-3-540-39658-1_2

G. Miklau and D. Suciu, Implementing a Tamper-Evident Database System, ASIAN: 10th Asian Computing Science Conference, pp.28-48, 2005.
DOI : 10.1007/11596370_5

H. Pang, A. Jain, K. Ramamritham, and K. Tan, Verifying completeness of relational query results in data publishing, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.407-418, 2005.
DOI : 10.1145/1066157.1066204

H. Pang and K. L. Tan, Authenticating query results in edge computing, Proceedings. 20th International Conference on Data Engineering, pp.560-571, 2004.
DOI : 10.1109/ICDE.2004.1320027

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, In: VLDB, pp.782-793, 2007.

M. Xie, H. Wang, J. Yin, and X. Meng, Providing freshness guarantees for outsourced databases, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, pp.323-332, 2008.
DOI : 10.1145/1353343.1353384

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, pp.107-138, 2006.
DOI : 10.1145/1149976.1149977

R. Tamassia, Authenticated Data Structures, ESA 2003, 2003.
DOI : 10.1007/978-3-540-39658-1_2

R. C. Merkle, A certified digital signature Advances in Cryptology-Crypto, pp.435-218, 1989.

M. T. Goodrich, R. Tamassia, and A. Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, pp.68-82, 2001.
DOI : 10.1109/DISCEX.2001.932160

A. Buldas, M. Roos, and J. Willemson, Undeniable replies for database queries, Proc. Intern. Baltic Conf. on DB and IS, pp.215-226, 2002.

M. T. Goodrich, R. Tamassia, and N. Triandopoulos, Super-Efficient Verification of Dynamic Outsourced Databases, Proc. RSA Conference, Cryptographers' Track (CT-RSA, pp.407-424, 2008.
DOI : 10.1007/978-3-540-79263-5_26

P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, Authentic data publication over the Internet1, Journal of Computer Security, vol.11, issue.3, pp.291-314, 2003.
DOI : 10.3233/JCS-2003-11302

S. Singh and S. Prabhakar, Ensuring correctness over untrusted private database, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, pp.476-486, 2008.
DOI : 10.1145/1353343.1353402

Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis, Authenticated join processing in outsourced databases, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.5-18, 2009.
DOI : 10.1145/1559845.1559849

Y. Zhou, A. Salehi, and K. Aberer, Scalable delivery of stream query result, Proceedings of the VLDB Endowment, vol.2, issue.1, pp.49-60, 2009.
DOI : 10.14778/1687627.1687634

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

W. Cheng and K. T. , Authenticating kNN Query Results in Data Publishing, Proc. 4th Int. Workshop on Secure Data Management, pp.47-63, 2007.
DOI : 10.1007/978-3-540-75248-6_4

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, pp.121-132, 2006.
DOI : 10.1145/1142473.1142488

T. K. Dang, Ensuring correctness, completeness, and freshness for outsourced treeindexed data, In: Information Resources Management Jrnl, issue.08, pp.59-76

M. Narasimha and G. Tsudik, Authentication of Outsourced Databases Using Signature Aggregation and Chaining, In: DASFAA, pp.420-436, 2006.
DOI : 10.1007/11733836_30

Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, Spatial Outsourcing for Location-based Services, 2008 IEEE 24th International Conference on Data Engineering, pp.1082-1091, 2008.
DOI : 10.1109/ICDE.2008.4497517

D. J. Polivy and R. Tamassia, Authenticating distributed data using Web services and XML signatures, Proceedings of the 2002 ACM workshop on XML security , XMLSEC '02, 2002.
DOI : 10.1145/764792.764805

W. Pugh, Skip lists: A probabilistic alternative to balanced trees, Workshop on Algorithms and Data Structures, pp.437-449, 1989.