Sciweavers

7 search results - page 2 / 2
» Authentication of Outsourced Databases Using Signature Aggre...
Sort
View
GIS
2010
ACM
13 years 3 months ago
Verifying spatial queries using Voronoi neighbors
With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the...
Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Sha...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
13 years 9 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino