搜索结果: 1-3 共查到“军事学 Authenticated data structures”相关记录3条 . 查询时间(0.187 秒)
Database Outsourcing with Hierarchical Authenticated Data Structures
Databases outsourcing Hierarchical authenticated data structures Authenticated join processing
2015/12/31
In an outsourced database scheme, the data owner delegates the data management tasks to a remote service
provider. At a later time, the remote service is supposed to answer any query on the database....
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
Cryptography for Efficiency Authenticated Data Lattices Parallel Online Memory Checking
2011/3/11
In this work, we initially design a new authenticated data structure
for a dynamic table with n entries. We present the first dynamic authenticated
table that is update-optimal, using a lattice-base...
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
authenticated data structures lattice-based cryptography memory checking
2012/3/29
In this work, we initially design a new authenticated data structure for a \emph{dynamic table} with $n$ entries. We present the first dynamic authenticated table that is \emph{update-optimal}, using ...