Author of the publication

Streaming Authenticated Data Structures: Abstraction and Implementation.

, , , and . CCSW, page 129-139. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Networks Node Mining Algorithm of Based on Greedy Subgraph., , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 157-168. Springer, (2018)vRAM: Faster Verifiable RAM with Program-Independent Preprocessing., , , , and . IEEE Symposium on Security and Privacy, page 908-925. IEEE Computer Society, (2018)A Model of Active Agent design to cope Hypertension's Emergencies situation rapidly Home healthcare., , and . IC-AI, page 225-231. CSREA Press, (2008)Anonymous Camera for Privacy Protection., , , and . ICPR, page 4170-4175. IEEE Computer Society, (2014)vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases., , , , and . IACR Cryptol. ePrint Arch., (2017)Streaming Authenticated Data Structures: Abstraction and Implementation., , , and . CCSW, page 129-139. ACM, (2014)Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G Slices., , , , , , and . CoRR, (2018)IntegriDB: Verifiable SQL for Outsourced Databases., , and . ACM Conference on Computer and Communications Security, page 1480-1491. ACM, (2015)A prototype automated knowledge acquisition system., , , and . IKE, page 170-175. CSREA Press, (2008)An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks., , and . TIIS, 8 (3): 778-798 (2014)