-
Notifications
You must be signed in to change notification settings - Fork 0
/
ref.bib
90 lines (81 loc) · 3.06 KB
/
ref.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
@misc{pgp,
title = {Personal Genome Project},
url = {http://www.personalgenomes.org},
year = {2016},
shorthand = {PGP16},
}
@inproceedings{10.1109/ICDE.2004.1320027,
title = {Authenticating query results in edge computing},
booktitle = {Proceedings of the 20th IEEE International Conference on Data Engineering},
author = {Pang, HweeHwa and Tan, Kian-Lee},
year = {2004},
pages = {560--571},
doi = {10.1109/icde.2004.1320027},
}
@inproceedings{10.1007/0-387-34805-0_21,
title = {A Certified Digital Signature},
booktitle = {Advances in Cryptology {\textemdash} {CRYPTO}' 89 Proceedings},
author = {Merkle, Ralph C.},
year = {1989},
pages = {218--238},
doi = {10.1007/0-387-34805-0_21},
}
@inproceedings{10.1145/2660267.2660373,
author = {Papadopoulos, Dimitrios and Papadopoulos, Stavros and Triandopoulos, Nikos},
title = {Taking Authenticated Range Queries to Arbitrary Dimensions},
booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
year = {2014},
pages = {819--830},
doi = {10.1145/2660267.2660373},
}
@inproceedings{10.1109/sp.2013.47,
title = {Pinocchio: Nearly practical verifiable computation},
author = {Parno, Bryan and Howell, Jon and Gentry, Craig and Raykova, Mariana},
booktitle = {2013 {IEEE} Symposium on Security and Privacy},
year = {2013},
pages = {238--252},
doi = {10.1109/sp.2013.47},
}
@inproceedings{10.1145/2517349.2522733,
author = {Braun, Benjamin and Feldman, Ariel J. and Ren, Zuocheng and Setty, Srinath and Blumberg, Andrew J. and Walfish, Michael},
title = {Verifying Computations with State},
booktitle = {Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles},
year = {2013},
pages = {341--357},
doi = {10.1145/2517349.2522733},
}
@inproceedings{10.1007/978-3-642-19074-2_24,
author = {Maji, Hemanta K. and Prabhakaran, Manoj and Rosulek, Mike},
booktitle = {Topics in Cryptology {\textendash} {CT}-{RSA} 2011},
title = {Attribute-Based Signatures},
year = {2011},
pages = {376--392},
doi = {10.1007/978-3-642-19074-2_24},
}
@inproceedings{10.1109/ICDE.1997.582015,
title = {{STR}: A Simple and Efficient Algorithm for {R-Tree} Packing},
booktitle = {Proceedings of the 13th IEEE International Conference on Data Engineering},
author = {Leutenegger, Scott T. and Edgington, Jeffrey M. and Lopez, Mario A.},
year = {1997},
pages = {497--506},
doi = {10.1109/ICDE.1997.582015},
}
@article{10.1007/s00778-008-0113-2,
title = {Authenticated indexing for outsourced spatial databases},
journal = {The {VLDB} Journal},
author = {Yang, Yin and Papadopoulos, Stavros and Papadias, Dimitris and Kollios, George},
year = {2008},
month = {9},
volume = {18},
number = {3},
pages = {631--648},
doi = {10.1007/s00778-008-0113-2},
}
@inproceedings{10.1007/978-3-540-30574-3_19,
author = {Nguyen, Lan},
title = {Accumulators from Bilinear Pairings and Applications},
booktitle = {Topics in Cryptology {\textendash} {CT}-{RSA} 2005},
year = {2005},
pages = {275--292},
doi = {10.1007/978-3-540-30574-3_19},
}