Keying Hash Functions for Message Authentication, Proc. 1996 IACR Int'l Conf. Advances in Cryptology ,
DOI : 10.1007/3-540-68697-5_1
URL : http://uncensored.citadel.org/pub/unix/bck2.pdf
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin, Proc. 1996 Int'l Conf. Advances in Cryptology ,
DOI : 10.1007/3-540-68339-9_34
One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Proc. 1993 IACR Int'l Conf. Advances in Cryptology ,
DOI : 10.1007/3-540-48285-7_24
URL : http://www.akira.ruc.dk/~keld/teaching/algoritmedesign_f08/artikler/10/benaloh94.pdf
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12 ,
DOI : 10.1145/2090236.2090263
URL : http://www.tau.ac.il/%7Etromer/papers/snark-20110817.pdf
Checking the correctness of memories, Algorithmica, vol.12, issue.2-3, 1994. ,
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Advances in cryptology, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://eprint.iacr.org/2002/175.ps.gz
Short signatures from the weil pairing, Proc. 2001 IACR Int'l Conf. Advances in Cryptology ,
DOI : 10.1007/s00145-004-0314-9
URL : http://www.iacr.org/archive/asiacrypt2001/22480516.pdf
Verifiable Set Operations over Outsourced Databases, Proc. 2014 IACR Int'l Conf. Public-Key Cryptography ,
DOI : 10.1007/978-3-642-54631-0_7
Authenticated Dictionaries, ACM Transactions on Information and System Security, vol.14, issue.2, p.17, 2011. ,
DOI : 10.1145/2019599.2019602
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, p.2014 ,
DOI : 10.1109/TPDS.2013.154
Efficient Private Matching and Set Intersection, Proc. 2004 IACR Int'l Conf. Advances in Cryptology ,
DOI : 10.1007/978-3-540-24676-3_1
URL : http://www.cs.bgu.ac.il/~kobbi/papers/FNP04-pm.ps
Executing sql over encrypted data in the database-service-provider model, Proc. 2002 ACM SIGMOD Int. Conf. Management of Data, 2002. ,
Query integrity verification based-on mac chain in cloud storage, Proc. 13th IEEE/ACIS Int. Conf. Computer and Information Science, 2014. ,
DOI : 10.2991/ijndc.2014.2.4.5
Trueset: Faster verifiable set computations, Proc. 23rd USENIX Int'l Conf. Security Symposium, 2014. ,
Authenticated data structures, generically, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '14, p.2014 ,
DOI : 10.1145/2535838.2535851
URL : http://www.cs.umd.edu/~mwh/papers/gpads.pdf
Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, 2006. ,
DOI : 10.1145/1149976.1149977
URL : http://snekker.ics.uci.edu/publications/./papers/mnt_ndss_2004.pdf
DSAC, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, 2005. ,
DOI : 10.1145/1099554.1099604
Accumulators from Bilinear Pairings and Applications, Proc. 2005 ,
DOI : 10.1007/978-3-540-30574-3_19
Topics in Cryptology, 2005. ,
The digital signature standard, Communications of the ACM, vol.35, issue.7, 2013. ,
DOI : 10.1145/129902.129904
Enabling security in cloud storage slas with cloudproof, Proc. USENIX Annual Technical Conf, 2011. ,
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011. ,
DOI : 10.1145/2043556.2043566
Computational complexity of Fourier transforms over finite fields, Mathematics of Computation, vol.31, issue.139, p.31, 1977. ,
DOI : 10.1090/S0025-5718-1977-0436662-8
Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755690
Authenticated Data Structures, 2003. ,
DOI : 10.1007/978-3-540-39658-1_2
Integrity auditing of outsourced data, Proc. 33rd Int. Conf. Very Large Data Bases. VLDB Endowment, 2007. ,