Here below is the list of Most Cited Publications about ‘Merkle Tree’.

Merkle Trees are data structures  used by blockchain technologies. They store hashes of data. It is particularly useful for decentralized network applications as a way to verify data is correct across different nodes or servers. Merkle trees is a cryptographic technique invented by Ralph Merkle. His personal website is merkle.com.

Last updated November 19th, 2017.

Most Cited ‘Merkle Tree’ Publications

  1. Dynamo: amazon’s highly available key-value store“. G DeCandia, D Hastorun, M Jampani…. 2007. dl.acm.org ACM SIGOPS operating …4088 cites.
  2. Random key predistribution schemes for sensor networks“. H Chan, A Perrig, D Song. 2003. ieeexplore.ieee.org Security and Privacy, 2003 …3698 cites.
  3. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks“. YC Hu, DB Johnson, A Perrig. 2003. Elsevier Ad hoc networks1864 cites.
  4. Dynamic provable data possession“. CC Erway, A Küpçü, C Papamanthou…. 2015. dl.acm.org ACM Transactions on …1020 cites.
  5. Privacy-preserving public auditing for secure cloud storage“. C Wang, SSM Chow, Q Wang, K Ren…. 2013. ieeexplore.ieee.org IEEE transactions on …942 cites.
  6. Plutus: Scalable Secure File Sharing on Untrusted Storage.“. M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu. 2003. usenix.org Fast881 cites.
  7. A survey of security issues in wireless sensor networks“. Y Wang, G Attebury, B Ramamurthy. 2006. digitalcommons.unl.edu 832 cites.
  8. Non-interactive verifiable computing: Outsourcing computation to untrusted workers“. R Gennaro, C Gentry, B Parno. 2010. Springer Advances in Cryptology–CRYPTO 2010737 cites.
  9. SECTOR: secure tracking of node encounters in multi-hop wireless networks“. S Čapkun, L Buttyán, JP Hubaux. 2003. dl.acm.org … of the 1st ACM workshop on Security …503 cites.
  10. Authentication and integrity in outsourced databases“. E Mykletun, M Narasimha, G Tsudik. 2006. dl.acm.org ACM Transactions on Storage …457 cites.
  11. Proofs of ownership in remote storage systems“. S Halevi, D Harnik, B Pinkas…. 2011. dl.acm.org Proceedings of the 18th …456 cites.
  12. Homomorphic signature schemes“. R Johnson, D Molnar, D Song, D Wagner. 2002. Springer CT-RSA392 cites.
  13. On certificate revocation and validation“. PC Kocher. 1998. Springer International Conference on Financial Cryptography348 cites.
  14. Dynamic authenticated index structures for outsourced databases“. F Li, M Hadjieleftheriou, G Kollios…. 2006. dl.acm.org Proceedings of the 2006 …344 cites.
  15. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization“. F Zhang, J Chen, H Chen, B Zang. 2011. dl.acm.org Proceedings of the Twenty-Third …341 cites.
  16. Efficient Replica Maintenance for Distributed Storage Systems.“. BG Chun, F Dabek, A Haeberlen, E Sit…. 2006. usenix.org NSDI297 cites.
  17. Authentic third-party data publication“. P Devanbu, M Gertz, C Martel…. 2002. Springer Data and Application …279 cites.
  18. An efficient scheme for authenticating public keys in sensor networks“. W Du, R Wang, P Ning. 2005. dl.acm.org Proceedings of the 6th ACM international …263 cites.
  19. Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks“. H Zhu, X Lin, R Lu, Y Fan…. 2009. ieeexplore.ieee.org IEEE Transactions on …263 cites.
  20. Verifying completeness of relational query results in data publishing“. HH Pang, A Jain, K Ramamritham, KL Tan. 2005. dl.acm.org Proceedings of the 2005 …263 cites.
  21. Caches and hash trees for efficient memory integrity verification“. B Gassend, GE Suh, D Clarke…. 2003. ieeexplore.ieee.org … , 2003. HPCA-9 …262 cites.
  22. Tahoe: the least-authority filesystem“. Z Wilcox-O’Hearn, B Warner. 2008. dl.acm.org Proceedings of the 4th ACM international …244 cites.
  23. Herding hash functions and the Nostradamus attack“. J Kelsey, T Kohno. 2006. Springer Annual International Conference on the Theory and …239 cites.
  24. Integrity auditing of outsourced data“. M Xie, H Wang, J Yin, X Meng. 2007. dl.acm.org … of the 33rd international conference on …238 cites.
  25. Zerocash: Decentralized anonymous payments from bitcoin“. EB Sasson, A Chiesa, C Garman…. 2014. ieeexplore.ieee.org Security and Privacy …236 cites.
  26. Accountable-subgroup multisignatures“. S Micali, K Ohta, L Reyzin. 2001. dl.acm.org Proceedings of the 8th ACM conference on …232 cites.
  27. Steganalysis of least significant bit matching using multi‐order differences“. Z Xia, X Wang, X Sun, B Wang. 2014. Wiley Online Library Security and Communication …230 cites.
  28. Securing the deluge network programming system“. PK Dutta, JW Hui, DC Chu…. 2006. ieeexplore.ieee.org Information Processing in …227 cites.
  29. Securely outsourcing linear algebra computations“. MJ Atallah, KB Frikken. 2010. dl.acm.org Proceedings of the 5th ACM Symposium on …222 cites.
  30. On the distribution and revocation of cryptographic keys in sensor networks“. H Chan, VD Gligor, A Perrig…. 2005. ieeexplore.ieee.org IEEE Transactions on …220 cites.
  31. Efficient Security Mechanisms for Routing Protocolsa.“. YC Hu, A Perrig, DB Johnson. 2003. isoc.org NDSS214 cites.
  32. Wormhole detection in wireless ad hoc networks“. YC Hu, A Perrig, DB Johnson. 2002. pdfs.semanticscholar.org … of Computer Science …210 cites.
  33. Micropayments revisited“. S Micali, RL Rivest. 2002. Springer CT-RSA207 cites.
  34. A general model for authenticated data structures“. C Martel, G Nuckolls, P Devanbu, M Gertz, A Kwong…. 2004. Springer Algorithmica201 cites.
  35. An ideal-security protocol for order-preserving encoding“. RA Popa, FH Li, N Zeldovich. 2013. ieeexplore.ieee.org Security and Privacy (SP), 2013 …201 cites.
  36. Practical broadcast authentication in sensor networks“. D Liu, P Ning, S Zhu, S Jajodia. 2005. ieeexplore.ieee.org Mobile and Ubiquitous …194 cites.
  37. Authenticating query results in edge computing“. HH Pang, KL Tan. 2004. ieeexplore.ieee.org Data Engineering, 2004. Proceedings. 20th …193 cites.
  38. Multi-user broadcast authentication in wireless sensor networks“. K Ren, S Yu, W Lou, Y Zhang. 2009. ieeexplore.ieee.org IEEE Transactions on Vehicular …191 cites.
  39. Boosting efficiency and security in proof of ownership for deduplication“. R Di Pietro, A Sorniotti. 2012. dl.acm.org Proceedings of the 7th ACM Symposium on …177 cites.
  40. Mobility helps peer-to-peer security“. S Capkun, JP Hubaux, L Buttyan. 2006. ieeexplore.ieee.org IEEE Transactions on …176 cites.
  41. Selective and authentic third-party distribution of XML documents“. E Bertino, B Carminati, E Ferrari…. 2004. ieeexplore.ieee.org … on Knowledge and …173 cites.
  42. Efficient generic forward-secure signatures with an unbounded number of time periods“. T Malkin, D Micciancio, S Miner. 2002. Springer Eurocrypt170 cites.
  43. HIDE: an infrastructure for efficiently protecting information leakage on the address bus“. X Zhuang, T Zhang, S Pande. 2004. dl.acm.org ACM SIGPLAN Notices169 cites.
  44. Flexible authentication of XML documents“. P Devanbu, M Gertz, A Kwong, C Martel…. 2004. content.iospress.com Journal of …167 cites.
  45. Authentic data publication over the Internet1“. P Devanbu, M Gertz, C Martel…. 2003. content.iospress.com Journal of Computer …160 cites.
  46. Fast, Inexpensive Content-Addressed Storage in Foundation.“. SC Rhea, R Cox, A Pesterev. 2008. usenix.org USENIX Annual Technical Conference154 cites.
  47. On broadcast authentication in wireless sensor networks“. K Ren, W Lou, K Zeng, PJ Moran. 2007. ieeexplore.ieee.org IEEE Transactions on …154 cites.
  48. Uncheatable grid computing“. W Du, M Murugesan, J Jia. 2010. dl.acm.org Algorithms and theory of computation …153 cites.
  49. Improving cost, performance, and security of memory encryption and authentication“. C Yan, D Englender, M Prvulovic, B Rogers…. 2006. dl.acm.org ACM SIGARCH …152 cites.
  50. The pollution attack in P2P live video streaming: measurement results and defenses“. P Dhungel, X Hei, KW Ross, N Saxena. 2007. dl.acm.org … of the 2007 workshop on Peer …152 cites.
  51. Private data deduplication protocols in cloud storage“. WK Ng, Y Wen, H Zhu. 2012. dl.acm.org Proceedings of the 27th Annual ACM …151 cites.
  52. Probabilistically bounded staleness for practical partial quorums“. P Bailis, S Venkataraman, MJ Franklin…. 2012. dl.acm.org Proceedings of the …150 cites.
  53. Zero-knowledge sets“. S Micali, M Rabin, J Kilian. 2003. ieeexplore.ieee.org Foundations of Computer Science …150 cites.
  54. Asymptotically efficient lattice-based digital signatures“. V Lyubashevsky, D Micciancio. 2008. Springer Theory of Cryptography147 cites.
  55. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts“. A Kosba, A Miller, E Shi, Z Wen…. 2016. ieeexplore.ieee.org Security and Privacy …147 cites.
  56. Private and cheating-free outsourcing of algebraic computations“. D Benjamin, MJ Atallah. 2008. ieeexplore.ieee.org … , Security and Trust, 2008. PST’08 …144 cites.
  57. Certificate transparency“. B Laurie, A Langley, E Kasper. 2013. rfc-editor.org 136 cites.
  58. Iris: A scalable cloud file system with efficient integrity checks“. E Stefanov, M van Dijk, A Juels, A Oprea. 2012. dl.acm.org Proceedings of the 28th …136 cites.
  59. Informed content delivery across adaptive overlay networks“. JW Byers, J Considine, M Mitzenmacher…. 2004. dl.acm.org IEEE/ACM Transactions …135 cites.
  60. Electronic lottery tickets as micropayments“. RL Rivest. 1997. Springer International Conference on Financial Cryptography129 cites.
  61. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.“. N Santos, R Rodrigues, KP Gummadi…. 2012. usenix.org USENIX security …129 cites.
  62. Scalable architectural support for trusted software“. D Champagne, RB Lee. 2010. ieeexplore.ieee.org High Performance Computer …127 cites.
  63. Merkle tree traversal in log space and time“. M Szydlo. 2004. Springer Eurocrypt124 cites.
  64. Tamper detection in audit logs“. RT Snodgrass, SS Yao, C Collberg. 2004. dl.acm.org … on Very large data bases-Volume …122 cites.
  65. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS“. LFG Sarmenta, M Van Dijk, CW O’Donnell…. 2006. dl.acm.org Proceedings of the first …122 cites.
  66. Distillation codes and applications to DoS resistant multicast authentication“. C Karlof, N Sastry, Y Li, A Perrig, JD Tygar. 2004. people.eecs.berkeley.edu NDSS121 cites.
  67. Recursive composition and bootstrapping for SNARKs and proof-carrying data“. N Bitansky, R Canetti, A Chiesa, E Tromer. 2013. dl.acm.org … of the forty-fifth annual ACM …120 cites.
  68. Memory Delegation.“. KM Chung, YT Kalai, FH Liu, R Raz. 2011. Springer CRYPTO117 cites.
  69. New approaches to security and availability for cloud data“. A Juels, A Oprea. 2013. dl.acm.org Communications of the ACM115 cites.
  70. Authenticated hash tables“. C Papamanthou, R Tamassia…. 2008. dl.acm.org Proceedings of the 15th …114 cites.
  71. Efficient audit service outsourcing for data integrity in clouds“. Y Zhu, H Hu, GJ Ahn, SS Yau. 2012. Elsevier Journal of Systems and Software112 cites.
  72. Practical dynamic proofs of retrievability“. E Shi, E Stefanov, C Papamanthou. 2013. dl.acm.org Proceedings of the 2013 ACM …112 cites.
  73. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction“. A Narayanan, J Bonneau, E Felten, A Miller…. 2016. books.google.com 109 cites.
  74. Certificate revocation in vehicular networks“. M Raya, D Jungels, P Papadimitratos…. 2006. researchgate.net … (LCA) School of …107 cites.
  75. A next-generation smart contract and decentralized application platform“. V Buterin. 2014. weusecoins.com white paper105 cites.
  76. Differing-Inputs Obfuscation and Applications.“. P Ananth, D Boneh, S Garg…. 2013. pdfs.semanticscholar.org IACR Cryptology …104 cites.
  77. Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage“. K Kursawe, AR Sadeghi, D Schellekens…. 2009. ieeexplore.ieee.org … Security and Trust …104 cites.
  78. Tree-based certificate revocation system“. S Micali. 2000. Google Patents US Patent 6,097,811104 cites.
  79. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly“. B Rogers, S Chhabra, M Prvulovic…. 2007. ieeexplore.ieee.org … , 2007. MICRO 2007 …102 cites.
  80. Efficient certificate revocation“. S Micali. 2002. Google Patents US Patent 6,487,658101 cites.
  81. Hardware-rooted trust for secure key management and transient trust“. JS Dwoskin, RB Lee. 2007. dl.acm.org Proceedings of the 14th ACM conference on …101 cites.
  82. Optimal verification of operations on dynamic sets“. C Papamanthou, R Tamassia…. 2011. Springer Annual Cryptology …98 cites.
  83. Fractal Merkle tree representation and traversal“. M Jakobsson, T Leighton, S Micali, M Szydlo. 2003. Springer Cryptographers’ Track at the …97 cites.
  84. SIA: Secure information aggregation in sensor networks“. H Chan, A Perrig, B Przydatek…. 2007. content.iospress.com Journal of Computer …97 cites.
  85. Sabotage-tolerance and trust management in desktop grid computing“. P Domingues, B Sousa, LM Silva. 2007. Elsevier Future Generation Computer Systems96 cites.
  86. SecCloud: Bridging secure storage and computation in cloud“. L Wei, H Zhu, Z Cao, W Jia…. 2010. ieeexplore.ieee.org … (ICDCSW), 2010 IEEE …96 cites.
  87. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks“. P Sakarindr, N Ansari. 2007. ieeexplore.ieee.org IEEE Wireless Communications95 cites.
  88. An efficient merkle-tree-based authentication scheme for smart grid“. H Li, R Lu, L Zhou, B Yang, X Shen. 2014. ieeexplore.ieee.org IEEE Systems Journal94 cites.
  89. Efficient and fresh certification“. I Gassko, PS Gemmell, P MacKenzie. 2000. Springer Public Key Cryptography94 cites.
  90. Certifying Program Execution with Secure Processors.“. B Chen, R Morris. 2003. static.usenix.org HotOS93 cites.
  91. Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2.“. J Guo, S Ling, C Rechberger, H Wang. 2010. Springer ASIACRYPT91 cites.
  92. Castor: Scalable secure routing for ad hoc networks“. W Galuba, P Papadimitratos…. 2010. ieeexplore.ieee.org INFOCOM, 2010 …88 cites.
  93. Multicast authentication in fully adversarial networks“. A Lysyanskaya, R Tamassia…. 2004. ieeexplore.ieee.org Security and Privacy …88 cites.
  94. Partially materialized digest scheme: an efficient verification method for outsourced databases“. K Mouratidis, D Sacharidis, HH Pang. 2009. dl.acm.org The VLDB Journal—The …88 cites.
  95. All about Eve: Execute-Verify Replication for Multi-Core Servers.“. M Kapritsos, Y Wang, V Quema, A Clement, L Alvisi…. 2012. usenix.org OSDI87 cites.
  96. Let’s chronosync: Decentralized dataset state synchronization in named data networking“. Z Zhu, A Afanasyev. 2013. ieeexplore.ieee.org Network Protocols (ICNP), 2013 21st IEEE …84 cites.
  97. Seven-property-preserving iterated hashing: ROX“. E Andreeva, G Neven, B Preneel…. 2007. Springer Advances in Cryptology …84 cites.
  98. Tree-based certificate revocation system“. S Micali. 2001. Google Patents US Patent 6,301,65984 cites.
  99. XMSS-a practical forward secure signature scheme based on minimal security assumptions“. J Buchmann, E Dahmen, A Hülsing. 2011. Springer Post-Quantum Cryptography84 cites.
  100. Blocked tree authorization and status systems“. F Sudia. 2004. Google Patents US Patent App. 10/949,71283 cites.
  101. An efficient integrity-preserving scheme for hierarchical sensor aggregation“. KB Frikken, JA Dougherty IV. 2008. dl.acm.org Proceedings of the first ACM conference …81 cites.
  102. End-to-end Data Integrity for File Systems: A ZFS Case Study.“. Y Zhang, A Rajimwale, AC Arpaci-Dusseau…. 2010. static.usenix.org FAST81 cites.
  103. Payment processing method and system“. R Nix, A Mesarovich, T Schwartz…. 2005. Google Patents US Patent App. 11 …81 cites.
  104. Cryptographic method for updating financial records“. SM Matyas. 1993. Google Patents US Patent 5,231,66679 cites.
  105. Cryptographic method for updating financial records“. SM Matyas. 1993. Google Patents US Patent 5,231,66679 cites.
  106. Efficient Data Structures For Tamper-Evident Logging.“. SA Crosby, DS Wallach. 2009. usenix.org USENIX Security Symposium79 cites.
  107. Secure two-party computation with low communication“. I Damgård, S Faust, C Hazay. 2012. Springer Theory of cryptography78 cites.
  108. Robust and efficient data management for a distributed hash table“. J Cates. 2003. dspace.mit.edu 77 cites.
  109. CMSS-an improved merkle signature scheme“. J Buchmann, LCC García, E Dahmen, M Döring…. 2006. Springer INDOCRYPT76 cites.
  110. Design space exploration and optimization of path oblivious ram in secure processors“. L Ren, X Yu, CW Fletcher, M Van Dijk…. 2013. dl.acm.org ACM SIGARCH …76 cites.
  111. Permacoin: Repurposing bitcoin work for data preservation“. A Miller, A Juels, E Shi, B Parno…. 2014. ieeexplore.ieee.org Security and Privacy (SP) …76 cites.
  112. An efficient broadcast authentication scheme in wireless sensor networks“. SM Chang, S Shieh, WW Lin, CM Hsieh. 2006. dl.acm.org Proceedings of the 2006 ACM …75 cites.
  113. Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks“. A Baadache, A Belmehdi. 2010. arxiv.org arXiv preprint arXiv:1002.168175 cites.
  114. Verifying computations with state“. B Braun, AJ Feldman, Z Ren, S Setty…. 2013. dl.acm.org Proceedings of the …75 cites.
  115. Enhanced Certificate Transparency and End-to-End Encrypted Mail.“. MD Ryan. 2014. pdfs.semanticscholar.org NDSS74 cites.
  116. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.“. Y Lu. 2012. internetsociety.org NDSS74 cites.
  117. Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.“. S Goldwasser, H Lin, A Rubinstein. 2011. eprint.iacr.org IACR Cryptology ePrint Archive73 cites.
  118. On the random-oracle methodology as applied to length-restricted signature schemes“. R Canetti, O Goldreich, S Halevi. 2004. Springer TCC73 cites.
  119. Self-verifying names for read-only named data“. M Baugher, B Davie, A Narayanan…. 2012. ieeexplore.ieee.org … WKSHPS), 2012 IEEE …73 cites.
  120. Jumbo Store: Providing Efficient Incremental Upload and Versioning for a Utility Rendering Service.“. K Eshghi, M Lillibridge, L Wilcock, G Belrose…. 2007. static.usenix.org FAST72 cites.
  121. A parameter-adaptive dynamic programming approach for inferring cophylogenies“. D Merkle, M Middendorf…. 2010. bmcbioinformatics.biomedcentral … BMC …71 cites.
  122. A remote password authentication scheme based on the digital signature method“. MS Hwang. 1999. Taylor & Francis International Journal of Computer Mathematics71 cites.
  123. Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland …“. C Cachin. 2004. books.google.com 71 cites.
  124. Enabling the Archival Storage of Signed Documents.“. P Maniatis, M Baker. 2002. cdn.baker.com FAST71 cites.
  125. Secure multihop network programming with multiple one-way key chains“. H Tan, J Zic, S Jha, D Ostry. 2011. ieeexplore.ieee.org IEEE Transactions on Mobile …71 cites.
  126. Encryption and authentication for scalable multimedia: Current state of the art and challenges“. BB Zhu, MD Swanson, S Li. 2004. proceedings.spiedigitallibrary.org Proc. SPIE69 cites.
  127. Flooding-resilient broadcast authentication for vanets“. HC Hsiao, A Studer, C Chen, A Perrig, F Bai…. 2011. dl.acm.org Proceedings of the 17th …69 cites.
  128. Indistinguishability obfuscation for turing machines with unbounded memory“. V Koppula, AB Lewko, B Waters. 2015. dl.acm.org … of the forty-seventh annual ACM …69 cites.
  129. Optimizing BGP security by exploiting path stability“. K Butler, P McDaniel, W Aiello. 2006. dl.acm.org … of the 13th ACM conference on …69 cites.
  130. Proof-infused streams: Enabling authentication of sliding window queries on streams“. F Li, K Yi, M Hadjieleftheriou, G Kollios. 2007. dl.acm.org Proceedings of the 33rd …69 cites.
  131. How to manage persistent state in DRM systems“. W Shapiro, R Vingralek. 2001. Springer ACM Workshop on Digital Rights Management68 cites.
  132. On protecting integrity and confidentiality of cryptographic file system for outsourced storage“. A Yun, C Shi, Y Kim. 2009. dl.acm.org Proceedings of the 2009 ACM workshop on Cloud …68 cites.
  133. SecureME: a hardware-software approach to full system security“. S Chhabra, B Rogers, Y Solihin…. 2011. dl.acm.org Proceedings of the …68 cites.
  134. Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection“. G Duc, R Keryell. 2006. ieeexplore.ieee.org … Conference, 2006. ACSAC’06. 22nd Annual67 cites.
  135. EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks“. X Zhang, J He, Q Wei. 2011. Springer EURASIP Journal on Wireless Communications …67 cites.
  136. Mercurial Commitments with Applications to Zero-Knowledge Sets.“. M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin. 2005. Springer Eurocrypt66 cites.
  137. On securing untrusted clouds with cryptography“. Y Chen, R Sion. 2010. dl.acm.org Proceedings of the 9th annual ACM workshop on …66 cites.
  138. Merkle signatures with virtually unlimited signature capacity“. J Buchmann, E Dahmen, E Klintsevich, K Okeya…. 2007. Springer … and Network Security65 cites.
  139. Hardware mechanisms for memory authentication: A survey of existing techniques and engines“. R Elbaz, D Champagne, C Gebotys, R Lee…. 2009. Springer Transactions on …64 cites.
  140. Hash based digital signature schemes“. C Dods, NP Smart, M Stam. 2005. Springer Lecture notes in computer science64 cites.
  141. CADS: Continuous authentication on data streams“. S Papadopoulos, Y Yang, D Papadias. 2007. dl.acm.org Proceedings of the 33rd …63 cites.
  142. Short Redactable Signatures Using Random Trees.“. EC Chang, CL Lim, J Xu. 2009. Springer CT-RSA62 cites.
  143. Trust but verify: accountability for network services“. AR Yumerefendi, JS Chase. 2004. dl.acm.org Proceedings of the 11th workshop on ACM …62 cites.
  144. Distributed user access control in sensor networks“. H Wang, Q Li. 2006. Springer DCOSS61 cites.
  145. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification“. S Haber, Y Hatano, Y Honda, W Horne…. 2008. dl.acm.org Proceedings of the …61 cites.
  146. Joint topology control and authentication design in mobile ad hoc networks with cooperative communications“. Q Guan, FR Yu, S Jiang…. 2012. ieeexplore.ieee.org IEEE Transactions on …61 cites.
  147. Providing freshness guarantees for outsourced databases“. M Xie, H Wang, J Yin, X Meng. 2008. dl.acm.org … of the 11th international conference on …61 cites.
  148. Defense against intrusion in a live streaming multicast system“. M Haridasan, R van Renesse. 2006. ieeexplore.ieee.org Peer-to-Peer Computing, 2006 …60 cites.
  149. Vector Commitments and Their Applications.“. D Catalano, D Fiore. 2013. Springer Public Key Cryptography59 cites.
  150. A coding-theoretic approach for efficient message verification over insecure channels“. D Slater, P Tague, R Poovendran, BJ Matt. 2009. dl.acm.org Proceedings of the second …58 cites.
  151. Certificate revocation using fine grained certificate space partitioning“. V Goyal. 2007. Springer … Conference on Financial Cryptography and Data …58 cites.
  152. Efficient verification of shortest path search via authenticated hints“. ML Yiu, Y Lin, K Mouratidis. 2010. ieeexplore.ieee.org Data Engineering (ICDE), 2010 …58 cites.
  153. Spatial query integrity with voronoi neighbors“. L Hu, WS Ku, S Bakiras…. 2013. ieeexplore.ieee.org IEEE Transactions on …58 cites.
  154. Efficient consistency proofs for generalized queries on a committed database“. R Ostrovsky, C Rackoff, A Smith. 2004. Springer ICALP57 cites.
  155. CONIKS: Bringing Key Transparency to End Users.“. MS Melara, A Blankstein, J Bonneau…. 2015. usenix.org USENIX Security …56 cites.
  156. Peppercoin micropayments“. RL Rivest. 2004. Springer Financial Cryptography56 cites.
  157. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks“. H Tan, D Ostry, J Zic, S Jha. 2013. Elsevier Computers & Security55 cites.
  158. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.“. AJ Feldman, A Blankstein, MJ Freedman…. 2012. usenix.org USENIX Security …55 cites.
  159. Authentication of moving kNN queries“. ML Yiu, E Lo, D Yung. 2011. ieeexplore.ieee.org Data Engineering (ICDE), 2011 IEEE …54 cites.
  160. Shroud: ensuring private access to large-scale data in the data center.“. JR Lorch, B Parno, JW Mickens, M Raykova…. 2013. usenix.org FAST54 cites.
  161. Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks“. R Elbaz, D Champagne, R Lee, L Torres…. 2007. Springer … and Embedded Systems …54 cites.
  162. Scalable zero knowledge via cycles of elliptic curves“. E Ben-Sasson, A Chiesa, E Tromer, M Virza. 2017. Springer Algorithmica53 cites.
  163. Obfuscated databases and group privacy“. A Narayanan, V Shmatikov. 2005. dl.acm.org Proceedings of the 12th ACM conference on …52 cites.
  164. Certificate transparency“. B Laurie. 2014. dl.acm.org Queue51 cites.
  165. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks“. Q Li, M Zhao, J Walker, YC Hu, A Perrig…. 2009. Wiley Online Library Security and …51 cites.
  166. Efficient data protection for distributed shared memory multiprocessors“. B Rogers, M Prvulovic, Y Solihin. 2006. ieeexplore.ieee.org Parallel Architectures and …50 cites.
  167. Antiquity: exploiting a secure log for wide-area distributed storage“. H Weatherspoon, P Eaton, BG Chun…. 2007. dl.acm.org ACM SIGOPS Operating …48 cites.
  168. Hourglass schemes: how to prove that cloud files are encrypted“. M Van Dijk, A Juels, A Oprea, RL Rivest…. 2012. dl.acm.org Proceedings of the …48 cites.
  169. An opportunistic batch bundle authentication scheme for energy constrained DTNs“. H Zhu, X Lin, R Lu, X Shen, D Xing…. 2010. ieeexplore.ieee.org … 2010 Proceedings IEEE46 cites.
  170. Optimal parameter selection for efficient memory integrity verification using merkle hash trees“. D Williams, EG Sirer. 2004. ieeexplore.ieee.org Network Computing and Applications …46 cites.
  171. Power consumption evaluation of efficient digital signature schemes for low power devices“. S Seys, B Preneel. 2005. ieeexplore.ieee.org Wireless And Mobile Computing …46 cites.
  172. Scalable security for petascale parallel file systems“. AW Leung, EL Miller, S Jones. 2007. ieeexplore.ieee.org … 2007. SC’07. Proceedings of the …46 cites.
  173. Efficient data authentication in an environment of untrusted third-party distributors“. MJ Atallah, YS Cho, A Kundu. 2008. ieeexplore.ieee.org Data Engineering, 2008. ICDE …45 cites.
  174. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks.“. MJ Miller, NH Vaidya. 2006. disc.ece.illinois.edu INFOCOM45 cites.
  175. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks“. A Baadache, A Belmehdi. 2012. Elsevier Journal of Network and Computer Applications44 cites.
  176. Incrementally verifiable computation or proofs of knowledge imply time/space efficiency“. P Valiant. 2008. Springer Theory of Cryptography44 cites.
  177. Stack and queue integrity on hostile platforms“. PT Devanbu, SG Stubblebine. 2002. ieeexplore.ieee.org IEEE Transactions on Software …44 cites.
  178. The trusted execution module: Commodity general-purpose trusted computing“. V Costan, L Sarmenta, M Van Dijk…. 2008. Springer Smart Card Research and …44 cites.
  179. The trusted execution module: Commodity general-purpose trusted computing“. V Costan, L Sarmenta, M Van Dijk…. 2008. Springer Smart Card Research and …44 cites.
  180. Zero-knowledge sets with short proofs“. D Catalano, D Fiore, M Messina. 2008. Springer … on the Theory and Applications of …44 cites.
  181. Caches and merkle trees for efficient memory authentication“. B Gassend, E Suh, D Clarke, M Van Dijk…. 2003. 129.69.211.95 Proceedings of Ninth …43 cites.
  182. Misbehavior in bitcoin: A study of double-spending and accountability“. GO Karame, E Androulaki, M Roeschlin…. 2015. dl.acm.org ACM Transactions on …43 cites.
  183. A Remark on a Signature Scheme where Forgery can be Proved“. G Bleumer, B Pfitzmann, M Waidner. 1990. Springer … on the Theory and Application of of …42 cites.
  184. ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication“. T Heer, S Götz, OG Morchon, K Wehrle. 2008. dl.acm.org Proceedings of the 2008 ACM …42 cites.
  185. Formal aspects of fail-stop signatures“. B Pfitzmann, M Waidner. 1990. semper.org 42 cites.
  186. Merkle Tree Traversal Revisited.“. JA Buchmann, E Dahmen, M Schneider. 2008. Springer PQCrypto42 cites.
  187. NoSQL systems for big data management“. VN Gudivada, D Rao…. 2014. ieeexplore.ieee.org … (SERVICES), 2014 IEEE …42 cites.
  188. Quasimodo: Efficient certificate validation and revocation“. FF Elwailly, C Gentry, Z Ramzan. 2004. Springer Public Key Cryptography42 cites.
  189. Verifying computations with streaming interactive proofs“. G Cormode, J Thaler, K Yi. 2011. dl.acm.org Proceedings of the VLDB Endowment42 cites.
  190. A content integrity service for long-term digital archives“. S Haber, P Kamat. 2006. ingentaconnect.com Archiving Conference41 cites.
  191. Concise mercurial vector commitments and independent zero-knowledge sets with short proofs“. B Libert, M Yung. 2010. Springer Theory of Cryptography Conference41 cites.
  192. Cryptographic Security for a High-Performance Distributed File System.“. R Pletka, C Cachin. 2007. researchgate.net MSST41 cites.
  193. Gnatdb: A small-footprint, secure database system“. R Vingralek. 2002. dl.acm.org Proceedings of the 28th international conference on …41 cites.
  194. Ensuring content integrity for untrusted peer-to-peer content distribution networks“. N Michalakis, R Soulé, R Grimm. 2007. dl.acm.org … of the 4th USENIX conference on …40 cites.
  195. Ipfs-content addressed, versioned, p2p file system“. J Benet. 2014. arxiv.org arXiv preprint arXiv:1407.356140 cites.
  196. Replication, history, and grafting in the ori file system“. AJ Mashtizadeh, A Bittau, YF Huang…. 2013. dl.acm.org Proceedings of the …40 cites.
  197. Succinct NP proofs from an extractability assumption“. G Di Crescenzo, H Lipmaa. 2008. Springer Conference on Computability in Europe40 cites.
  198. Transparent, distributed, and replicated dynamic provable data possession“. M Etemad, A Küpçü. 2013. Springer … Conference on Applied Cryptography and Network …40 cites.
  199. A flexible and scalable authentication scheme for JPEG2000 image codestreams“. C Peng, RH Deng, Y Wu, W Shao. 2003. dl.acm.org Proceedings of the eleventh ACM …39 cites.
  200. How to update documents verifiably in searchable symmetric encryption“. K Kurosawa, Y Ohtaki. 2013. Springer … Conference on Cryptology and Network Security39 cites.
  201. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.“. A Oprea, MK Reiter. 2007. usenix.org USENIX Security Symposium39 cites.
  202. Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions“. G Itkis. 2002. Springer … Conference on Security in Communication Networks39 cites.
  203. Secure data discovery and dissemination based on hash tree for wireless sensor networks“. D He, S Chan, S Tang, M Guizani. 2013. ieeexplore.ieee.org IEEE transactions on …39 cites.
  204. Verifiable Oblivious Storage.“. D Apon, J Katz, E Shi…. 2014. books.google.com Public Key Cryptography39 cites.
  205. Fast hash-based signatures on constrained devices“. S Rohde, T Eisenbarth, E Dahmen, J Buchmann…. 2008. Springer CARDIS38 cites.
  206. Min-round resettable zero-knowledge in the public-key model“. S Micali, L Reyzin. 2001. Springer International Conference on the Theory and …38 cites.
  207. Providing efficient privacy-aware incentives for mobile sensing“. Q Li, G Cao. 2014. ieeexplore.ieee.org … Computing Systems (ICDCS), 2014 IEEE 34th …38 cites.
  208. Updatable zero-knowledge databases“. M Liskov. 2005. Springer Asiacrypt38 cites.
  209. A dynamic Proof of Retrievability (PoR) scheme with O (logn) complexity“. Z Mo, Y Zhou, S Chen. 2012. ieeexplore.ieee.org Communications (ICC), 2012 IEEE …37 cites.
  210. On Provably Secure Time-Stamping Schemes.“. A Buldas, M Saarepera. 2004. Springer ASIACRYPT37 cites.
  211. Optimal Authenticated Data Structures with Multilinear Forms.“. C Papamanthou, R Tamassia, N Triandopoulos. 2010. Springer Pairing37 cites.
  212. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks“. H Lin, J Ma, J Hu, K Yang. 2012. Springer EURASIP Journal on Wireless …37 cites.
  213. Two 1-Round Protocols for Delegation of Computation.“. R Canetti, B Riva, GN Rothblum. 2011. pdfs.semanticscholar.org IACR Cryptology ePrint …37 cites.
  214. On kabatianskii-krouk-smeets signatures“. PL Cayrel, A Otmani, D Vergnaud. 2007. Springer WAIFI36 cites.
  215. One-time signatures revisited: Have they become practical?“. D Naor, A Shenhav, A Wool. 2005. academia.edu IACR Cryptology ePrint Archive36 cites.
  216. OverCite: A Distributed, Cooperative CiteSeer.“. J Stribling, J Li, IG Councill, MF Kaashoek, R Morris. 2006. static.usenix.org NSDI36 cites.
  217. Scalable security for large, high performance storage systems“. AW Leung, EL Miller. 2006. dl.acm.org Proceedings of the second ACM workshop on …36 cites.
  218. The hunting of the SNARK“. N Bitansky, R Canetti, A Chiesa, S Goldwasser…. 2017. Springer Journal of …36 cites.
  219. The performance impact of BGP security“. M Zhao, SW Smith, DM Nicol. 2005. ieeexplore.ieee.org IEEE network36 cites.
  220. MABS: Multicast authentication based on batch signature“. Y Zhou, X Zhu, Y Fang. 2010. ieeexplore.ieee.org IEEE Transactions on Mobile …35 cites.
  221. Parallelizable authentication trees“. WE Hall, CS Jutla. 2005. Springer Selected Areas in Cryptography35 cites.
  222. Verified query results from hybrid authentication trees“. G Nuckolls. 2005. Springer DBSec35 cites.
  223. Efficient long-term validation of digital signatures“. A Ansper, A Buldas, M Roos, J Willemson. 2001. Springer Public Key Cryptography34 cites.
  224. Fast approximate reconciliation of set differences“. J Byers, J Considine, M Mitzenmacher. 2002. dcommon.bu.edu 34 cites.
  225. Improving public auditability, data possession in data storage security for cloud computing“. M Venkatesh, MR Sumalatha…. 2012. ieeexplore.ieee.org Recent Trends In …34 cites.
  226. Optimal trade-off for Merkle tree traversal“. P Berman, M Karpinski, Y Nekrich. 2005. Springer International Conference on E …34 cites.
  227. Proofs of space: When space is of the essence“. G Ateniese, I Bonacina, A Faonio, N Galesi. 2014. Springer International Conference on …34 cites.
  228. C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks“. Q Jing, J Hu, Z Chen. 2006. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems …33 cites.
  229. Efficient content authentication in peer-to-peer networks“. R Tamassia, N Triandopoulos. 2007. Springer Applied Cryptography and Network …33 cites.
  230. Fast checking of individual certificate revocation on small systems“. S Russell. 1999. ieeexplore.ieee.org … Security Applications Conference, 1999.(ACSAC’99 …33 cites.
  231. Freecursive oram:[nearly] free recursion and integrity verification for position-based oblivious ram“. CW Fletcher, L Ren, A Kwon, M van Dijk…. 2015. dl.acm.org ACM SIGPLAN …33 cites.
  232. On the communication complexity of secure function evaluation with long output“. P Hubacek, D Wichs. 2015. dl.acm.org Proceedings of the 2015 Conference on …33 cites.
  233. Virtual machine images as structured data: the mirage image library“. G Ammons, V Bala, T Mummert, D Reimer…. 2011. usenix.org Proceedings of the …33 cites.
  234. XPay: Practical anonymous payments for Tor routing and other networked services“. Y Chen, R Sion, B Carbunar. 2009. dl.acm.org Proceedings of the 8th ACM workshop on …33 cites.
  235. Authenticated data structures, generically“. A Miller, M Hicks, J Katz, E Shi. 2014. dl.acm.org ACM SIGPLAN Notices32 cites.
  236. Content routers: Fetching data on network path“. W Wong, M Giraldi, MF Magalhaes…. 2011. ieeexplore.ieee.org … (ICC), 2011 IEEE …32 cites.
  237. Efficient distributed security for wireless medical sensor networks“. OG Morchon, H Baldus. 2008. ieeexplore.ieee.org Intelligent Sensors, Sensor Networks …32 cites.
  238. One-time signature scheme from syndrome decoding over generic error-correcting codes“. PSLM Barreto, R Misoczki, MA Simplicio Jr. 2011. Elsevier Journal of Systems and …32 cites.
  239. SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks“. MS Islam, MA Hamid, CS Hong. 2009. Springer Transactions on Computational Science …32 cites.
  240. Verifying spatial queries using Voronoi neighbors“. L Hu, WS Ku, S Bakiras, C Shahabi. 2010. dl.acm.org Proceedings of the 18th …32 cites.
  241. Efficient content authentication in peer-to-peer networks“. R Tamassia, N Triandopoulos. 2011. Google Patents US Patent 7,974,22131 cites.
  242. Minimal information disclosure with efficiently verifiable credentials“. D Bauer, DM Blough, D Cash. 2008. dl.acm.org Proceedings of the 4th ACM workshop on …31 cites.
  243. Multimedia Broadcast Authentication Based on Batch Signature [Advances in Mobile Multimedia]“. Y Zhou, Y Fang. 2007. ieeexplore.ieee.org IEEE Communications Magazine31 cites.
  244. On Bitcoin as a public randomness source.“. J Bonneau, J Clark, S Goldfeder. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …31 cites.
  245. Robustness in the Salus Scalable Block Store.“. Y Wang, M Kapritsos, Z Ren, P Mahajan…. 2013. usenix.org NSDI31 cites.
  246. Secure auditing and deduplicating data in cloud“. J Li, J Li, D Xie, Z Cai. 2016. ieeexplore.ieee.org IEEE Transactions on Computers31 cites.
  247. Verifiable data streaming“. D Schröder, H Schröder. 2012. dl.acm.org Proceedings of the 2012 ACM conference on …31 cites.
  248. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme“. O Ugus, D Westhoff, JM Bohli. 2009. dl.acm.org … of the second ACM conference on …30 cites.
  249. A secure client side deduplication scheme in cloud storage environments“. N Kaaniche, M Laurent. 2014. ieeexplore.ieee.org New Technologies, Mobility and …30 cites.
  250. Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring“. ST Ali, V Sivaraman, D Ostry. 2014. Elsevier Future Generation Computer Systems30 cites.
  251. Independent zero-knowledge sets“. R Gennaro, S Micali. 2006. Springer Automata, Languages and Programming30 cites.
  252. Integrity verification for path oblivious-ram“. L Ren, CW Fletcher, X Yu, M Van Dijk…. 2013. ieeexplore.ieee.org … (HPEC), 2013 IEEE30 cites.
  253. SecureStream: An intrusion-tolerant protocol for live-streaming dissemination“. M Haridasan, R van Renesse. 2008. Elsevier Computer Communications30 cites.
  254. Statistically Hiding Sets.“. M Prabhakaran, R Xue. 2009. Springer CT-RSA30 cites.
  255. Explicit Non-Malleable Codes Resistant to Permutations.“. S Agrawal, D Gupta, HK Maji…. 2014. pdfs.semanticscholar.org Electronic …29 cites.
  256. Revocation transparency“. B Laurie, E Kasper. 2012. links.org Google Research, September29 cites.
  257. Digital Signatures Out of Second-Preimage Resistant Hash Functions.“. E Dahmen, K Okeya, T Takagi, C Vuillaume. 2008. Springer PQCrypto28 cites.
  258. Exploring the pub/sub routing & forwarding space“. A Zahemszky, A Császár, P Nikander…. 2009. ieeexplore.ieee.org Communications …28 cites.
  259. Locally Decodable and Updatable Non-Malleable Codes and Their Applications.“. D Dachman-Soled, FH Liu, E Shi, HS Zhou. 2015. eprint.iacr.org TCC (1)28 cites.
  260. Roles and security in a publish/subscribe network architecture“. D Lagutin, K Visala, A Zahemszky…. 2010. ieeexplore.ieee.org … (ISCC), 2010 IEEE …28 cites.
  261. Single-level integrity and confidentiality protection for distributed shared memory multiprocessors“. B Rogers, C Yan, S Chhabra…. 2008. ieeexplore.ieee.org … , 2008. HPCA 2008 …28 cites.
  262. Transparent data deduplication in the cloud“. F Armknecht, JM Bohli, GO Karame…. 2015. dl.acm.org Proceedings of the 22nd …28 cites.
  263. A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable.“. C Wang, Y Zhou. 2010. usenix.org HotCloud27 cites.
  264. A secure incentive scheme for delay tolerant networks“. H Zhu, X Lin, R Lu, X Shen. 2008. ieeexplore.ieee.org Communications and Networking …27 cites.
  265. An intelligent approach for building a secure decentralized public key infrastructure in VANET“. N Kumar, R Iqbal, S Misra, JJPC Rodrigues. 2015. Elsevier Journal of Computer and …27 cites.
  266. Authenticated in-network programming for wireless sensor networks“. I Krontiris, T Dimitriou. 2006. Springer Lecture notes in computer science27 cites.
  267. Efficient query integrity for outsourced dynamic databases“. Q Zheng, S Xu, G Ateniese. 2012. dl.acm.org Proceedings of the 2012 ACM Workshop on …27 cites.
  268. Non-interactive timestamping in the bounded storage model“. T Moran, R Shaltiel, A Ta-Shma. 2004. Springer CRYPTO27 cites.
  269. Streaming authenticated data structures“. C Papamanthou, E Shi, R Tamassia, K Yi. 2013. Springer … International Conference on …27 cites.
  270. A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms“. G Yang, JT Wang, HB Cheng…. 2007. en.cnki.com.cn Dianzi Xuebao(Acta …26 cites.
  271. Access control friendly query verification for outsourced data publishing“. H Chen, X Ma, W Hsu, N Li, Q Wang. 2008. Springer European Symposium on Research …26 cites.
  272. Authenticated dictionaries: Real-world costs and trade-offs“. SA Crosby, DS Wallach. 2011. dl.acm.org ACM Transactions on Information and System …26 cites.
  273. Deduplication on encrypted big data in cloud“. Z Yan, W Ding, X Yu, H Zhu…. 2016. ieeexplore.ieee.org IEEE transactions on big …26 cites.
  274. Detecting blackhole attacks on DSR-based mobile ad hoc networks“. I Woungang, SK Dhurandher, RD Peddi…. 2012. ieeexplore.ieee.org Computer …26 cites.
  275. On the privacy provisions of bloom filters in lightweight bitcoin clients“. A Gervais, S Capkun, GO Karame…. 2014. dl.acm.org Proceedings of the 30th …26 cites.
  276. Secure data outsourcing based on threshold secret sharing; towards a more practical solution“. MA Hadavi, R Jalili. 2010. vldbarc.org Proc. VLDB PhD Workshop26 cites.
  277. A tunable proof of ownership scheme for deduplication using bloom filters“. J Blasco, R Di Pietro, A Orfila…. 2014. ieeexplore.ieee.org … and Network Security …25 cites.
  278. Authentication of scalable video streams with low communication overhead“. K Mokhtarian, M Hefeeda. 2010. ieeexplore.ieee.org IEEE Transactions on multimedia25 cites.
  279. Secure remote execution of sequential computations“. GO Karame, M Strasser, S Čapkun. 2009. Springer International Conference on …25 cites.
  280. Sine: Cache-friendly integrity for the web“. C Gaspard, S Goldberg, W Itani…. 2009. ieeexplore.ieee.org … , 2009. NPSec 2009 …25 cites.
  281. Tightly-secure signatures from chameleon hash functions“. O Blazy, SA Kakvi, E Kiltz, J Pan. 2015. Springer IACR International Workshop on Public …25 cites.
  282. A secure hybrid wireless mesh protocol for 802.11 s mesh network“. MS Islam, YJ Yoon, MA Hamid, CS Hong. 2008. Springer International Conference on …24 cites.
  283. A tree-based forward digest protocol to verify data integrity in distributed media streaming“. A Habib, D Xu, M Atallah, B Bhargava…. 2005. ieeexplore.ieee.org IEEE Transactions on …24 cites.
  284. Cloud security: Issues and concerns“. P Samarati, SDC di Vimercati…. 2016. books.google.com … on Cloud Computing24 cites.
  285. End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media“. C Gentry, A Hevia, R Jain, T Kawahara…. 2005. ieeexplore.ieee.org IEEE Journal on …24 cites.
  286. Method and apparatus for secure and small credits for verifiable service provider metering“. CB Gentry, ZA Ramzan. 2009. Google Patents US Patent 7,620,60624 cites.
  287. On broadcast authentication in wireless sensor networks“. K Ren, K Zeng, W Lou, PJ Moran. 2006. Springer International Conference on Wireless …24 cites.
  288. Optimal parameters for XMSSMT“. A Hülsing, L Rausch, J Buchmann. 2013. Springer International Conference on …24 cites.
  289. Repairing return address stack for buffer overflow protection“. YJ Park, G Lee. 2004. dl.acm.org Proceedings of the 1st conference on Computing …24 cites.
  290. Strong worm“. R Sion. 2008. ieeexplore.ieee.org Distributed Computing Systems, 2008. ICDCS’08. The …24 cites.
  291. Efficient attribute authentication with applications to ad hoc networks“. M Jakobsson, S Wetzel. 2004. dl.acm.org Proceedings of the 1st ACM international …23 cites.
  292. Performance analysis of the Libswift P2P streaming protocol“. R Petrocco, J Pouwelse…. 2012. ieeexplore.ieee.org Peer-to-Peer Computing …23 cites.
  293. Data dynamics for remote data possession checking in cloud storage“. L Chen, S Zhou, X Huang, L Xu. 2013. Elsevier Computers & Electrical Engineering22 cites.
  294. Decentralized trusted timestamping using the crypto currency bitcoin“. B Gipp, N Meuschke, A Gernandt. 2015. arxiv.org arXiv preprint arXiv:1502.0401522 cites.
  295. Forward Secure Signatures on Smart Cards.“. A Hülsing, C Busold, JA Buchmann. 2012. Springer Selected Areas in Cryptography22 cites.
  296. Hash-based signatures“. D McGrew, M Curcio. 2015. . 22 cites.
  297. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions“. A Miller, A Kosba, J Katz, E Shi. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …22 cites.
  298. Short Hash-Based Signatures for Wireless Sensor Networks.“. E Dahmen, C Krauß. 2009. Springer CANS22 cites.
  299. A system for end-to-end authentication of adaptive multimedia content“. T Suzuki, Z Ramzan, H Fujimoto, C Gentry…. 2005. Springer … and Multimedia Security21 cites.
  300. A universally composable scheme for electronic cash“. M Trolin. 2005. Springer Progress in Cryptology-INDOCRYPT 200521 cites.
  301. An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks.“. M Haque, ASK Pathan, CS Hong…. 2008. networking.khu.ac.kr KSII Transactions on …21 cites.
  302. CRTBA: Chinese remainder theorem-based broadcast authentication in wireless sensor networks“. J Zhang, W Yu, X Liu. 2009. ieeexplore.ieee.org Computer Network and Multimedia …21 cites.
  303. Forensic snapshot“. MD Lillibridge, K Keeton. 2008. Google Patents US Patent App. 12/290,61721 cites.
  304. Knowledge-binding commitments with applications in time-stamping“. A Buldas, S Laur. 2007. Springer Public Key Cryptography–PKC 200721 cites.
  305. Polylogarithmic two-round argument systems“. T Mie. 2008. degruyter.com Journal of Mathematical Cryptology21 cites.
  306. Post-Quantum Signatures.“. JA Buchmann, LCC García, M Döring…. 2004. eprint.iacr.org IACR Cryptology …21 cites.
  307. PUF-based authentication protocols–revisited“. H Busch, S Katzenbeisser, P Baecher. 2009. Springer International Workshop on …21 cites.
  308. Scatter–secure code authentication for efficient reprogramming in wireless sensor networks“. I Krontiris, T Dimitriou. 2011. inderscienceonline.com International Journal of Sensor …21 cites.
  309. Symmetric-key based proofs of retrievability supporting public verification“. C Guan, K Ren, F Zhang, F Kerschbaum…. 2015. Springer European Symposium on …21 cites.
  310. A new timestamping scheme based on skip lists“. K Blibech, A Gabillon. 2006. Springer Computational Science and Its Applications-ICCSA …20 cites.
  311. A survey of access control schemes in wireless sensor networks“. Y Faye, I Niang, T Noel. 2011. pdfs.semanticscholar.org Proc. World Acad. Sci. Eng. Tech20 cites.
  312. An efficient confidentiality-preserving proof of ownership for deduplication“. L González-Manzano, A Orfila. 2015. Elsevier Journal of Network and Computer …20 cites.
  313. Cooperative security in distributed networks“. O Garcia-Morchon, D Kuptsov, A Gurtov…. 2013. Elsevier Computer …20 cites.
  314. Data Transmission Optimization“. S Tarkoma. 2009. Google Patents US Patent App. 13/318,34520 cites.
  315. Domain based storage protection with secure access control for the cloud“. N Paladi, A Michalas, C Gehrmann. 2014. dl.acm.org Proceedings of the 2nd …20 cites.
  316. Efficient generic forward-secure signatures and proxy signatures“. B Alomair, K Sampigethaya, R Poovendran. 2008. Springer Public Key Infrastructure20 cites.
  317. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey“. M Vigil, J Buchmann, D Cabarcas, C Weinert…. 2015. Elsevier Computers & …20 cites.
  318. On the security and the efficiency of the Merkle signature scheme“. LCC Garcıa. 2005. pdfs.semanticscholar.org 20 cites.
  319. Publicly verifiable proofs of sequential work“. M Mahmoody, T Moran, S Vadhan. 2013. dl.acm.org … of the 4th conference on Innovations …20 cites.
  320. Quasiperiodic Sturmian words and morphisms“. F Levé, G Richomme. 2007. Elsevier Theoretical computer science20 cites.
  321. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.“. L Luu, V Narayanan, K Baweja, C Zheng…. 2015. weusecoins.com IACR Cryptology …20 cites.
  322. Secure time-stamping schemes: A distributed point of view“. A Bonnecaze, P Liardet, A Gabillon…. 2006. Springer Annals of …20 cites.
  323. Content identification for peer-to-peer content retrieval“. RT Rao, KE Ahmed, RS Briggs, SA Plant. 2012. Google Patents US Patent 8,112,47719 cites.
  324. Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.“. S Seys, B Preneel. 2005. Springer SPC19 cites.
  325. Efficient verification of web-content searching through authenticated web crawlers“. MT Goodrich, C Papamanthou, D Nguyen…. 2012. dl.acm.org Proceedings of the …19 cites.
  326. Keyless signatures’ infrastructure: How to build global distributed hash-trees“. A Buldas, A Kroonmaa, R Laanoja. 2013. Springer Nordic Conference on Secure IT …19 cites.
  327. Merkle signature schemes, merkle trees and their cryptanalysis“. G Becker. 2008. pdfs.semanticscholar.org Ruhr-University Bochum, Tech. Rep.19 cites.
  328. Provable ownership of files in deduplication cloud storage“. C Yang, J Ren, J Ma. 2015. Wiley Online Library Security and Communication Networks19 cites.
  329. Software techniques to combat drift in puf-based authentication systems“. MS Kirkpatrick, E Bertino. 2010. academia.edu Workshop on Secure Component and …19 cites.
  330. Toward Practical Private Access to Data Centers via Parallel ORAM.“. JR Lorch, JW Mickens, B Parno, M Raykova…. 2012. eprint.iacr.org IACR Cryptology …19 cites.
  331. Verifiable and revocable expression of consent to processing of aggregated personal data“. H Pöhls. 2008. Springer Information and Communications Security19 cites.
  332. Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem“. MH Eldefrawy, MK Khan, K Alghathbar, ES Cho. 2010. mdpi.com Sensors18 cites.
  333. Cooperative public key authentication protocol in wireless sensor network“. DH Nyang, A Mohaisen. 2006. Springer UIC18 cites.
  334. Enforcing safety and consistency constraints in policy-based authorization systems“. AJ Lee, M Winslett. 2008. dl.acm.org ACM Transactions on Information and System …18 cites.
  335. Merkle tree authentication of HTTP responses“. RJ Bayardo, J Sorensen. 2005. dl.acm.org Special interest tracks and posters of the 14th …18 cites.
  336. Pollution in P2P live video streaming“. P Dhungel, X Hei, KW Ross…. 2009. researchgate.net International Journal of …18 cites.
  337. Secure acknowledgment aggregation and multisignatures with limited robustness“. C Castelluccia, S Jarecki, J Kim, G Tsudik. 2006. Elsevier Computer Networks18 cites.
  338. Supporting robust and secure interactions in open domains through recovery of trust negotiations“. AC Squicciarini, A Trombetta…. 2007. ieeexplore.ieee.org … Systems, 2007. ICDCS’ …18 cites.
  339. A distributed approach for secure M2M communications“. YB Saied, A Olivereau, M Laurent. 2012. ieeexplore.ieee.org New Technologies, Mobility …17 cites.
  340. A role based privacy-aware secure routing protocol for wireless mesh networks“. H Lin, J Hu, J Ma, L Xu, A Nagar. 2014. Springer Wireless Personal Communications17 cites.
  341. A security approach for off-chip memory in embedded microprocessor systems“. R Vaslin, G Gogniat, JP Diguet, E Wanderley…. 2009. Elsevier Microprocessors and …17 cites.
  342. Deypos: Deduplicatable dynamic proof of storage for multi-user environments“. K He, J Chen, R Du, Q Wu, G Xue…. 2016. ieeexplore.ieee.org IEEE Transactions on …17 cites.
  343. Ensuring correctness over untrusted private database“. S Singh, S Prabhakar. 2008. dl.acm.org Proceedings of the 11th international conference …17 cites.
  344. Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.“. D Slamanig, S Rass. 2010. Springer Communications and Multimedia Security17 cites.
  345. IntegriDB: Verifiable SQL for outsourced databases“. Y Zhang, J Katz, C Papamanthou. 2015. dl.acm.org Proceedings of the 22nd ACM …17 cites.
  346. MBS-OCSP: An OCSP based certificate revocation system for wireless environments“. D Berbecaru. 2004. ieeexplore.ieee.org … Technology, 2004. Proceedings of the Fourth …17 cites.
  347. Mobile agent route protection through hash-based mechanisms“. J Domingo-Ferrer. 2001. Springer Lecture notes in computer science17 cites.
  348. Sublinear scaling for multi-client private information retrieval“. W Lueks, I Goldberg. 2015. Springer … Conference on Financial Cryptography and Data …17 cites.
  349. A general model for authentic data publication“. C Martel, G Nuckolls, P Devanbu, M Gertz, A Kwong…. 2001. cs.ucdavis.edu Algorithmica16 cites.
  350. Authenticated index structures for aggregation queries in outsourced databases“. F Li, M Hadjieleftheriou, G Kollios, L Reyzin. 2006. open.bu.edu 16 cites.
  351. Broadcast authentication in sensor networks using compressed bloom filters“. YS Chen, IL Lin, CL Lei, YH Liao. 2008. Springer Distributed Computing in Sensor …16 cites.
  352. CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.“. MS Melara, A Blankstein, J Bonneau…. 2014. cm.1-s.es IACR Cryptology ePrint …16 cites.
  353. Continuous spatial authentication“. S Papadopoulos, Y Yang, S Bakiras…. 2009. Springer … Symposium on Spatial …16 cites.
  354. Efficiently binding data to owners in distributed content-addressable storage systems“. P Eaton, H Weatherspoon…. 2005. ieeexplore.ieee.org Security in Storage …16 cites.
  355. Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET“. VA Hiremani, MM Jadhao. 2013. ieeexplore.ieee.org Green Computing, Communication …16 cites.
  356. Encryption and authentication of data and for decryption and verification of authenticity of data“. C Cachin, PT Hurley, RA Pletka. 2007. Google Patents US Patent App. 11/622,46716 cites.
  357. e-SAFE: An extensible, secure and fault tolerant storage system“. S Agarwala, A Paul, U Ramachandran…. 2007. ieeexplore.ieee.org Self-Adaptive and …16 cites.
  358. Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.“. A Biryukov, D Dinu, D Khovratovich. 2015. eprint.iacr.org IACR Cryptology ePrint Archive16 cites.
  359. On Round-Efficient Argument Systems.“. H Wee. 2005. Springer ICALP16 cites.
  360. 云存储中的数据完整性证明研究及进展“. 谭霜, 贾焰, 韩伟红. 2015. cjc.ict.ac.cn 计算机学报16 cites.
  361. Bucket‐based authentication for outsourced databases“. J Wang, X Du, J Lu, W Lu. 2010. Wiley Online Library Concurrency and Computation …15 cites.
  362. Certifying data from multiple sources“. G Nuckolls, C Martel, SG Stubblebine. 2004. Springer Data and Applications Security …15 cites.
  363. Energy efficiency in M2M networks: A cooperative key establishment system“. YB Saied, A Olivereau…. 2011. ieeexplore.ieee.org … and Control Systems and …15 cites.
  364. One-time sensors: A novel concept to mitigate node-capture attacks“. K Bicakci, C Gamage, B Crispo…. 2005. Springer … on Security in Ad-hoc and …15 cites.
  365. Sapc: a secure aggregation protocol for cluster-based wireless sensor networks“. C Bekara, M Laurent-Maknavicius, K Bekara. 2007. Springer International Conference on …15 cites.
  366. Scalable certificate revocation schemes for smart grid ami networks using bloom filters“. K Rabieh, MMEA Mahmoud, K Akkaya…. 2017. ieeexplore.ieee.org IEEE Transactions on …15 cites.
  367. Single-layer fractal hash chain traversal with almost optimal complexity“. DH Yum, JW Seo, S Eom, PJ Lee. 2009. Springer Cryptographers’ Track at the RSA …15 cites.
  368. Super-efficient aggregating history-independent persistent authenticated dictionaries“. SA Crosby, DS Wallach. 2009. Springer European Symposium on Research in Computer …15 cites.
  369. Techniques to audit and certify the long-term integrity of digital archives“. S Song, J JaJa. 2009. Springer International Journal on Digital Libraries15 cites.
  370. Versum: Verifiable computations over large public logs“. J van den Hooff, MF Kaashoek…. 2014. dl.acm.org Proceedings of the 2014 …15 cites.
  371. A practical voting scheme with receipts“. M Klonowski, M Kutylowski, A Lauks, F Zagórski. 2005. Springer ISC14 cites.
  372. An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees“. F Coelho. 2008. Springer Lecture Notes in Computer Science14 cites.
  373. Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession“. E Esiner, A Küpçü, Ö Özkasap. 2014. Springer International Conference on Intelligent …14 cites.
  374. Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.“. A Buldas, M Niitsoo. 2010. Springer ACISP14 cites.
  375. Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Networks-A Review“. NP John, A Thomas. 2012. ijird.com International Journal of Innovative Research and …14 cites.
  376. Privacy-preserving verification of aggregate queries on outsourced databases“. S Haber, W Horne, T Sander, D Yao. 2006. academia.edu 14 cites.
  377. Providing authentication and integrity in outsourced databases using Merkle hash trees“. E Mykletun, M Narasimha…. 2003. people.eecs.berkeley.edu UCI-SCONCE …14 cites.
  378. Securing JPEG2000 code-streams“. RH Deng, Y Wu, D Ma. 2005. Springer Computer Security in the 21st Century14 cites.
  379. A contract-based accountability service model“. C Wang, S Chen, J Zic. 2009. ieeexplore.ieee.org Web Services, 2009. ICWS 2009. IEEE …13 cites.
  380. A trusted infrastructure for p2p-based marketplaces“. TTA Dinh, T Chothia, M Ryan. 2009. ieeexplore.ieee.org Peer-to-Peer Computing, 2009 …13 cites.
  381. Black-box non-black-box zero knowledge“. V Goyal, R Ostrovsky, A Scafuro, I Visconti. 2014. dl.acm.org Proceedings of the forty …13 cites.
  382. Content discovery and transfer between mobile communications nodes“. GF O’shea, TC Zahn, A Rowstron. 2012. Google Patents US Patent 8,103,71813 cites.
  383. Hey, NSA: Stay away from my market! Future proofing app markets against powerful attackers“. S Fahl, S Dechand, H Perl, F Fischer, J Smrcek…. 2014. dl.acm.org Proceedings of the …13 cites.
  384. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things“. YB Saied, A Olivereau. 2012. ieeexplore.ieee.org Communications and Networking …13 cites.
  385. Making secure processors os-and performance-friendly“. S Chhabra, B Rogers, Y Solihin…. 2009. dl.acm.org ACM Transactions on …13 cites.
  386. Merkle tree authentication in UDDI registries“. E Bertino, B Carminati, E Ferrari. 2004. igi-global.com International Journal of Web …13 cites.
  387. One-time signatures revisited: Practical fast signatures using fractal merkle tree traversal“. D Naor, A Shenhav, A Wool. 2006. ieeexplore.ieee.org Electrical and Electronics …13 cites.
  388. Reliable hash trees for post-quantum stateless cryptographic hash-based signatures“. M Mozaffari-Kermani…. 2015. ieeexplore.ieee.org Defect and Fault …13 cites.
  389. Scalable trusted online dissemination of JPEG2000 images“. RH Deng, D Ma, W Shao, Y Wu. 2005. Springer Multimedia Systems13 cites.
  390. State management for hash-based signatures“. D McGrew, P Kampanakis, S Fluhrer…. 2016. Springer Security Standardisation …13 cites.
  391. An enhanced distributed weighted clustering routing protocol for key management“. K Gomathi, B Parvathavarthini. 2015. indjst.org Indian Journal of Science and Technology12 cites.
  392. Authenticated storage using small trusted hardware“. HJ Yang, V Costan, N Zeldovich…. 2013. dl.acm.org Proceedings of the 2013 …12 cites.
  393. Efficient content authentication over distributed hash tables“. R Tamassia, N Triandopoulos. 2005. cs.brown.edu Proc. Int’l Conf. Applied Cryptography …12 cites.
  394. Formal verification of smart contracts: Short paper“. K Bhargavan, A Delignat-Lavaud, C Fournet…. 2016. dl.acm.org Proceedings of the …12 cites.
  395. Optimized hash tree for authentication in sensor networks“. V Kondratieva, SW Seo. 2007. ieeexplore.ieee.org IEEE communications letters12 cites.
  396. PIF: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks“. K Zhang, X Liang, R Lu, X Shen. 2015. ieeexplore.ieee.org IEEE Transactions on …12 cites.
  397. Proof of ownership in deduplicated cloud storage with mobile device efficiency“. CM Yu, CY Chen, HC Chao. 2015. ieeexplore.ieee.org IEEE Network12 cites.
  398. The bitcoin lightning network“. J Poon, T Dryja. 2015. lightning.network 12 cites.
  399. Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks“. HT Pai, J Deng, YS Han. 2010. Elsevier Computer communications12 cites.
  400. Trustworthy data from untrusted databases“. R Jain, S Prabhakar. 2013. ieeexplore.ieee.org Data Engineering (ICDE), 2013 IEEE …12 cites.
  401. Wormhole attack prevention mechanism for RPL based LLN network“. FI Khan, T Shon, T Lee, K Kim. 2013. ieeexplore.ieee.org Ubiquitous and Future …12 cites.
  402. A practical authentication scheme for in-network programming in wireless sensor networks“. I Krontiris, T Dimitriou. 2006. researchgate.net Proceedings of the 2nd ACM Workshop on …11 cites.
  403. A secure and efficient audit mechanism for dynamic shared data in cloud storage“. O Kwon, D Koo, Y Shin, H Yoon. 2014. hindawi.com The Scientific World Journal11 cites.
  404. An efficient certificate revocation scheme for large-scale AMI networks“. M Mahmoud, K Akkaya, K Rabieh…. 2014. ieeexplore.ieee.org … (IPCCC), 2014 IEEE …11 cites.
  405. An efficient PKC-based security architecture for wireless sensor networks“. MM Haque, ASK Pathan, BG Choi…. 2007. ieeexplore.ieee.org … , 2007. MILCOM 2007 …11 cites.
  406. Application of synchronous dynamic encryption system (SDES) in wireless sensor networks“. HS Soliman, M Omari. 2005. dl.acm.org Proceedings of the 2nd ACM international …11 cites.
  407. Authentic Time-Stamps for Archival Storage.“. A Oprea, KD Bowers. 2009. Springer ESORICS11 cites.
  408. Balloon: A forward-secure append-only persistent authenticated data structure“. T Pulls, R Peeters. 2015. Springer European Symposium on Research in Computer …11 cites.
  409. Computation, memory and bandwidth efficient distillation codes to mitigate dos in multicast“. R Di Pietro, S Chessa…. 2005. ieeexplore.ieee.org Security and Privacy for …11 cites.
  410. Faster hash-based signatures with bounded leakage“. T Eisenbarth, I Von Maurich, X Ye. 2013. Springer International Conference on Selected …11 cites.
  411. Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.“. M Rückert, M Schneider, D Schröder. 2010. Springer ACNS11 cites.
  412. Homomorphic payment addresses and the pay-to-contract protocol“. I Gerhardt, T Hanke. 2012. arxiv.org arXiv preprint arXiv:1212.325711 cites.
  413. Joint authentication and quality of service provisioning in cooperative communication networks“. R Ramamoorthy, FR Yu, H Tang, P Mason…. 2012. Elsevier Computer …11 cites.
  414. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components.“. C Weinhold, H Härtig. 2011. static.usenix.org USENIX Annual Technical Conference11 cites.
  415. Low latency solution for confidentiality and integrity checking in embedded systems with off-chip memory“. R Vaslin, G Gogniat, JP Diguet…. 2007. hal.archives-ouvertes.fr … -centric Socs 200711 cites.
  416. Managing Integrity for Data Exchanged on the Web.“. G Miklau, D Suciu. 2005. dsc.ufcg.edu.br WebDB11 cites.
  417. Merkle tree traversal techniques“. B Ederov. 2007. www-old.cdc.informatik.tu-darmstadt … Bachelor Thesis, Darmstadt …11 cites.
  418. Mobile assisted key distribution in wireless sensor networks“. B Tas, AS Tosun. 2011. ieeexplore.ieee.org … ICC), 2011 IEEE International Conference on11 cites.
  419. Post-quantum cryptography: lattice signatures“. J Buchmann, R Lindner, M Rückert, M Schneider. 2009. Springer Computing11 cites.
  420. Reliable broadcast message authentication in wireless sensor networks“. T Yao, S Fukunaga, T Nakai. 2006. Springer Emerging Directions in Embedded and …11 cites.
  421. Tree-formed verification data for trusted platforms“. AU Schmidt, A Leicher, A Brett, Y Shah, I Cha. 2013. Elsevier Computers & Security11 cites.
  422. Universally composable anonymous Hash certification model“. F Zhang, JF Ma, SJ Moon. 2007. Springer Science in China Series F: Information …11 cites.
  423. Bitcoin Developer Reference“. K Okupski. 2014. enetium.com Availabl e at http://enetium. com/resources/Bitcoin. pdf10 cites.
  424. Certificate Transparency“. A Langley, E Kasper, B Laurie. 2013. tools.ietf.org 10 cites.
  425. Corslet: A shared storage system keeping your data private“. W Xue, JW Shu, Y Liu, M Xue. 2011. Springer Science China Information Sciences10 cites.
  426. Distributed access control for xml document centric collaborations“. MA Rahaman, Y Roudier…. 2008. ieeexplore.ieee.org … Conference, 2008. EDOC’ …10 cites.
  427. Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost“. Z Hu, P Mohassel, M Rosulek. 2015. Springer Annual Cryptology Conference10 cites.
  428. End-to-end secure delivery of scalable video streams“. K Mokhtarian, M Hefeeda. 2009. dl.acm.org … of the 18th international workshop on …10 cites.
  429. Fault detection architectures for post-quantum cryptographic stateless hash-based secure signatures benchmarked on ASIC“. M Mozaffari-Kermani, R Azarderakhsh…. 2016. dl.acm.org ACM Transactions on …10 cites.
  430. New realizations of somewhere statistically binding hashing and positional accumulators“. T Okamoto, K Pietrzak, B Waters, D Wichs. 2015. Springer International Conference on …10 cites.
  431. On deletion of outsourced data in cloud computing“. Z Mo, Q Xiao, Y Zhou, S Chen. 2014. ieeexplore.ieee.org Cloud Computing (CLOUD) …10 cites.
  432. On the scalability of an efficient “Nonscalable” key distribution scheme“. M Ramkumar. 2008. ieeexplore.ieee.org World of Wireless, Mobile and Multimedia …10 cites.
  433. Providing privacy-aware incentives in mobile sensing systems“. Q Li, G Cao. 2016. ieeexplore.ieee.org IEEE Transactions on Mobile Computing10 cites.
  434. Scalable Anonymous Communication with Provable Security.“. P Mittal, N Borisov, C Troncoso, A Rial, IKU Leuven. 2010. usenix.org HotSec10 cites.
  435. Scalable authentication and key management in SCADA“. L Xiao, IL Yen, F Bastani. 2010. ieeexplore.ieee.org Parallel and Distributed Systems …10 cites.
  436. Secure and efficient authentication in wireless mesh networks using merkle trees“. L Santhanam, B Xie, DP Agrawal. 2008. ieeexplore.ieee.org Local Computer Networks …10 cites.
  437. Space savings and design considerations in variable length deduplication“. G Appaji Nag Yasa, PC Nagesh. 2012. dl.acm.org ACM SIGOPS Operating Systems …10 cites.
  438. System-level security for network processors with hardware monitors“. K Hu, T Wolf, T Teixeira, R Tessier. 2014. dl.acm.org Proceedings of the 51st Annual …10 cites.
  439. Towards a more democratic mining in bitcoins“. G Paul, P Sarkar, S Mukherjee. 2014. Springer International Conference on Information …10 cites.
  440. Verifiably Encrypted Signatures from RSA without NIZKs.“. M Rückert. 2009. Springer INDOCRYPT10 cites.
  441. 基于分级 Merkle 树的无线传感器网络广播认证策略“. 蒋毅, 史浩山, 赵洪钢. 2007. airitilibrary.com 系統仿真學報10 cites.
  442. A Blockchain-Based Approach to Health Information Exchange Networks“. K Peterson, R Deeduvanu, P Kanjamala, K Boles. 2016. colleaga.org 9 cites.
  443. A fast real-time memory authentication protocol“. Y Hu, G Hammouri, B Sunar. 2008. dl.acm.org Proceedings of the 3rd ACM workshop on …9 cites.
  444. A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications“. N Kaaniche, E El Moustaine…. 2014. ieeexplore.ieee.org Cluster, Cloud and Grid …9 cites.
  445. Accountable privacy for decentralized anonymous payments“. C Garman, M Green, I Miers. 2016. Springer … on Financial Cryptography and Data Security9 cites.
  446. An Analysis of Secure Processor Architectures.“. S Chhabra, Y Solihin, R Lal, M Hoekstra. 2010. Springer Trans. Computational Science9 cites.
  447. An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage.“. Y Xia, F Xia, X Liu, X Sun, Y Liu, Y Ge. 2014. kpubs.org KSII Transactions on Internet & …9 cites.
  448. Analysis of a proposed hash-based signature standard“. J Katz. 2016. Springer Security Standardisation Research9 cites.
  449. Authenticated and persistent skip graph: a data structure for cloud based data-centric applications“. TP Shabeera, P Chandran, SD Kumar. 2012. dl.acm.org Proceedings of the International …9 cites.
  450. Authentication of moving range queries“. D Yung, E Lo, ML Yiu. 2012. dl.acm.org Proceedings of the 21st ACM international …9 cites.
  451. Bitcoin clients“. R Skudnov. 2012. theseus.fi 9 cites.
  452. Cryptographic hashing for virus localization“. G Di Crescenzo, F Vakil. 2006. dl.acm.org Proceedings of the 4th ACM workshop on …9 cites.
  453. CryptoPage: Support matériel pour cryptoprocessus“. G Duc, R Keryell, C Lauradoux. 2005. Lavoisier TSI. Technique et science informatiques9 cites.
  454. Customer-centric energy usage data management and sharing in smart grid systems“. G Lahoti, D Mashima, WP Chen. 2013. dl.acm.org Proceedings of the first ACM workshop …9 cites.
  455. Data integrity proof and secure computation in cloud computing“. V Ponnuramu, L Tamilselvan. 2012. Citeseer Journal of Computer Science9 cites.
  456. Datacube: A P2P persistent data storage architecture based on hybrid redundancy schema“. HB Ribeiro, E Anceaume. 2010. ieeexplore.ieee.org Parallel, Distributed and Network …9 cites.
  457. Efficient code-based one-time signature from automorphism groups with syndrome compatibility“. P Gaborit, J Schrek. 2012. ieeexplore.ieee.org Information Theory Proceedings (ISIT) …9 cites.
  458. EthIKS: Using Ethereum to audit a CONIKS key transparency log“. J Bonneau. 2016. Springer … Conference on Financial Cryptography and Data …9 cites.
  459. iBigTable: practical data integrity for bigtable in public cloud“. W Wei, T Yu, R Xue. 2013. dl.acm.org Proceedings of the third ACM conference on Data …9 cites.
  460. Keychain-based signatures for securing BGP“. H Yin, B Sheng, H Wang, J Pan. 2010. ieeexplore.ieee.org IEEE Journal on Selected …9 cites.
  461. Lite-CA based key pre-distribution scheme in wireless sensor network“. Y Pan, L WANG, Z CAO, J Li. 2009. en.cnki.com.cn Journal on Communications9 cites.
  462. Method and apparatus for tamper-proof wirte-once-read-many computer storage“. R Sion. 2008. Google Patents US Patent App. 12/598,7269 cites.
  463. Multimedia content authentication for proxy-side adaptation“. AR Kaced, JC Moissinac. 2006. ieeexplore.ieee.org Digital Telecommunications,, 2006 …9 cites.
  464. Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment“. Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu…. 2013. dl.acm.org Proceedings of the ACM …9 cites.
  465. On the synchronization bottleneck of OpenStack Swift-like cloud storage systems“. TT Chekam, E Zhai, Z Li, Y Cui…. 2016. ieeexplore.ieee.org … , IEEE INFOCOM 2016 …9 cites.
  466. One-time proxy signatures revisited“. K Bicakci. 2007. Elsevier Computer Standards & Interfaces9 cites.
  467. Outsourcing multi-version key-value stores with verifiable data freshness“. Y Tang, T Wang, X Hu, R Sailer, L Liu…. 2014. ieeexplore.ieee.org … (ICDE), 2014 IEEE …9 cites.
  468. Paser: Secure and efficient routing approach for airborne mesh networks“. M Sbeiti, N Goddemeier, D Behnke…. 2016. ieeexplore.ieee.org IEEE Transactions on …9 cites.
  469. SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks“. K Zhang, X Liang, R Lu, XS Shen. 2013. ieeexplore.ieee.org … (ICC), 2013 IEEE …9 cites.
  470. Secure and reliable distributed health records: achieving query assurance across repositories of encrypted health data“. A Clarke, R Steele. 2012. ieeexplore.ieee.org System Science (HICSS), 2012 45th …9 cites.
  471. Security Properties of Domain Extenders for Cryptographic Hash Functions.“. E Andreeva, B Mennink, B Preneel. 2010. pdfs.semanticscholar.org JIPS9 cites.
  472. Smart grid mesh network security using dynamic key distribution with merkle tree 4-way handshaking“. B Hu, H Gharavi. 2014. ieeexplore.ieee.org IEEE Transactions on Smart Grid9 cites.
  473. System and method for fast and scalable multimedia authentication in real time environment“. C Chong, K Chow, H Chung, C Hui, K Yu…. 2006. Google Patents US Patent App. 11 …9 cites.
  474. Taking authenticated range queries to arbitrary dimensions“. D Papadopoulos, S Papadopoulos…. 2014. dl.acm.org Proceedings of the 2014 …9 cites.
  475. The phish-market protocol: securely sharing attack data between competitors“. T Moran, T Moore. 2010. Springer Financial Cryptography and Data Security9 cites.
  476. The reduced address space (ras) for application memory authentication“. D Champagne, R Elbaz, RB Lee. 2008. Springer International Conference on Information …9 cites.
  477. VeriStream–a framework for verifiable data streaming“. D Schöder, M Simkin. 2015. Springer … Conference on Financial Cryptography and Data …9 cites.
  478. WebTrust–A comprehensive authenticity and integrity framework for HTTP“. M Backes, RW Gerling, S Gerling, S Nürnberger…. 2014. Springer … Conference on Applied …9 cites.
  479. A one-time signature using run-length encoding“. R Steinwandt, VI Villányi. 2008. Elsevier Information Processing Letters8 cites.
  480. A security plane for publish/subscribe based content oriented networks“. W Wong, F Verdi, MF Magalhães. 2008. dl.acm.org Proceedings of the 2008 ACM …8 cites.
  481. AFS: privacy-preserving public auditing with data freshness in the cloud“. P Maheswari, B Sindhumathi. 0. academia.edu … of Computer Engineering (IOSRJCE) e-ISSN8 cites.
  482. Auditable privacy: On tamper-evident mix networks“. JY Choi, P Golle, M Jakobsson. 2006. Springer Financial Cryptography8 cites.
  483. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment“. B Lee, JH Lee. 2017. Springer The Journal of Supercomputing8 cites.
  484. Certificate Transparency v2. 1a“. B Laurie, E Kasper. 2012. pdfs.semanticscholar.org Links. org, September8 cites.
  485. Content discovery and transfer between mobile communications nodes“. GF O’shea, TC Zahn, A Rowstron. 2013. Google Patents US Patent 8,402,0878 cites.
  486. Cryptocash, cryptocurrencies, and cryptocontracts“. N Koblitz, AJ Menezes. 2016. Springer Designs, Codes and Cryptography8 cites.
  487. Cryptography for parallel RAM from indistinguishability obfuscation“. YC Chen, SSM Chow, KM Chung, RWF Lai…. 2016. dl.acm.org Proceedings of the …8 cites.
  488. Data security, privacy, availability and integrity in cloud computing: issues and current solutions“. S Aldossary, W Allen. 2016. pdfs.semanticscholar.org Int. J. Adv. Comput. Sci. Appl8 cites.
  489. Data security, privacy, availability and integrity in cloud computing: issues and current solutions“. S Aldossary, W Allen. 2016. pdfs.semanticscholar.org Int. J. Adv. Comput. Sci. Appl8 cites.
  490. Data syncing in a distributed system“. J Cantwell, W Minckler, J Roback…. 2015. Google Patents US Patent App. 14 …8 cites.
  491. Does secure time-stamping imply collision-free hash functions?“. A Buldas, A Jürgenson. 2007. Springer Provable Security8 cites.
  492. Efficient message authentication protocol for WSN“. MS Rosales, GG Garcia, GD Sanchez. 2009. wseas.us WSEAS Transactions on …8 cites.
  493. Ensuring dynamic data integrity with public auditability for cloud storage“. L Chen, H Chen. 2012. ieeexplore.ieee.org Computer Science & Service System (CSSS) …8 cites.
  494. eRIPP‐FS: Enforcing privacy and security in RFID“. M Conti, R Di Pietro, LV Mancini…. 2010. Wiley Online Library Security and …8 cites.
  495. How traveling salespersons prove their identity“. S Lucks. 1995. Springer Cryptography and Coding8 cites.
  496. Instant revocation“. JA Solworth. 2008. Springer European Public Key Infrastructure Workshop8 cites.
  497. Inversion of a recursive tree traversal“. JLA Van de Snepscheut. 1991. Elsevier Information processing letters8 cites.
  498. Research on Secure Routing Protocols in Wireless Sensor Networks [J]“. D WU, G HU, G NI, W LI, Z ZHANG. 2008. en.cnki.com.cn Chinese Journal of Sensors and …8 cites.
  499. Signature System and Signature Method“. C Vuillaume, K Okeya, M Yoshino. 2007. Google Patents US Patent App. 11/848,3868 cites.
  500. System and method for efficient trust preservation in data stores“. T Li, X Ma. 2009. Google Patents US Patent App. 12/388,4228 cites.
  501. A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.“. C Castelluccia, S Jarecki, J Kim, G Tsudik. 2004. Springer SCN7 cites.
  502. A short redactable signature scheme using pairing“. S Lim, E Lee, CM Park. 2012. Wiley Online Library Security and Communication …7 cites.
  503. Dynamic Merkle trees for verifying privileges in sensor networks“. L Zhou, CV Ravishankar. 2006. ieeexplore.ieee.org Communications, 2006. ICC’06 …7 cites.
  504. Efficient public key authentication in MANET“. VR Ghorpade, YV Joshi, RR Manthalkar. 2009. dl.acm.org Proceedings of the …7 cites.
  505. Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems“. Z Mo, Y Zhou, S Chen, C Xu. 2014. ieeexplore.ieee.org Cloud Computing (CLOUD) …7 cites.
  506. Enabling public verifiability and availability for secure data storage in cloud computing“. RM Jogdand, RH Goudar, GB Sayed, PB Dhamanekar. 2015. Springer Evolving Systems7 cites.
  507. Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network.“. SY Lim, MH Lim. 2011. JUSPN7 cites.
  508. Explicit proxies for HTTP/2.0“. R Peon. 2012. . 7 cites.
  509. Fast secure communications in shared memory multiprocessor systems“. M Lee, M Ahn, EJ Kim. 2011. ieeexplore.ieee.org IEEE Transactions on Parallel and …7 cites.
  510. Going beyond pollution attacks: Forcing byzantine clients to code correctly“. RA Popa, A Chiesa, T Badirkhanli…. 2011. arxiv.org arXiv preprint arXiv …7 cites.
  511. Homomorphic Signatures for Digital Photographs.“. R Johnson, L Walsh, M Lamb. 2011. Springer Financial Cryptography7 cites.
  512. Integrity verification of outsourced frequent itemset mining with deterministic guarantee“. B Dong, R Liu, WH Wang. 2013. ieeexplore.ieee.org Data Mining (ICDM), 2013 IEEE …7 cites.
  513. Joint pollution detection and attacker identification in peer-to-peer live streaming“. B Hu, HV Zhao. 2010. ieeexplore.ieee.org … and Signal Processing (ICASSP), 2010 IEEE …7 cites.
  514. MAC precomputation with applications to secure memory“. J Garay, V Kolesnikov, R McLellan. 2009. Springer International Conference on …7 cites.
  515. Microcredits for verifiable foreign service provider metering“. C Gentry, Z Ramzan. 2004. Springer Financial Cryptography7 cites.
  516. Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity“. S Haber, WG Horne, T Sander…. 2009. people.cs.vt.edu Privacy enhancing …7 cites.
  517. Privacy-preserving participatory sensing“. Q Li, G Cao. 2015. ieeexplore.ieee.org IEEE Communications Magazine7 cites.
  518. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability“. X Liang, S Shetty, D Tosh, C Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …7 cites.
  519. Secure and DoS-resistant network reprogramming in sensor networks based on CPK“. Y Zhang, XS Zhou, YM Ji, ZY Fang…. 2008. ieeexplore.ieee.org … Networking and Mobile …7 cites.
  520. SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks“. AR Kaced, JC Moissinac. 2006. ieeexplore.ieee.org Internet Surveillance and Protection …7 cites.
  521. Symmetric Cryptographic Protocols“. M Ramkumar. 2014. books.google.com 7 cites.
  522. Towards integrating key distribution with entity authentication for efficient, scalable and secure group communication in MANETs“. M Striki, JS Baras. 2004. ieeexplore.ieee.org Communications, 2004 IEEE International …7 cites.
  523. Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis“. I Alqassem, D Svetinovic. 2014. ieeexplore.ieee.org … IEEE and Cyber, Physical and Social …7 cites.
  524. 一种云存储环境下的安全存储系统“. 薛矛, 薛巍, 舒继武, 刘洋. 2015. cjc.ict.ac.cn 计算机学报7 cites.
  525. A light weight security scheme for HWMP protocol using Elliptic Curve technique“. J Ben-Othman, YIS Benitez. 2011. ieeexplore.ieee.org Local Computer Networks (LCN) …6 cites.
  526. A privacy-preserving reauthentication scheme for mobile wireless sensor networks“. S Jiang, J Zhang, JJ Miao…. 2013. journals.sagepub.com International Journal of …6 cites.
  527. An efficient scheme for removing compromised sensor nodes from wireless sensor networks“. Y Wang, B Ramamurthy, X Zou…. 2010. Wiley Online Library Security and …6 cites.
  528. An Efficient TCB for a Generic Data Dissemination System“. A Velagapalli, S Mohanty…. 2012. pdfs.semanticscholar.org … on Communications in …6 cites.
  529. Authentication mechanism on wireless sensor networks: A survey“. P Guo, J Wang, J Zhu, Y Cheng. 2013. pdfs.semanticscholar.org Proceedings of the 2nd …6 cites.
  530. Combined authentication and quality of service in cooperative communication networks“. R Ramamoorthy, FR Yu, H Tang…. 2010. ieeexplore.ieee.org … Computing (EUC), 2010 …6 cites.
  531. Databank: An economics based privacy preserving system for distributing relevant advertising and content“. RM Lukose, M Lillibridge. 2006. academia.edu 6 cites.
  532. Efficient Quantum-Immune Keyless Signatures with Identity.“. A Buldas, R Laanoja, A Truu. 2014. pdfs.semanticscholar.org IACR Cryptology ePrint …6 cites.
  533. Extending existing blockchains with virtualchain“. J Nelson, M Ali, R Shea…. 2016. zurich.ibm.com Workshop on Distributed …6 cites.
  534. Fuzzy trust model for wireless sensor networks with intrusion tolerance“. L Wang, YB Guo, Y Zhan. 2010. en.cnki.com.cn Journal on Communications6 cites.
  535. Graphene-SGX: A practical library OS for unmodified applications on SGX“. CC Tsai, DE Porter, M Vij. 2017. usenix.org 2017 USENIX Annual Technical Conference …6 cites.
  536. Hashing scheme for space-efficient detection and localization of changes in large data sets“. V Kontak, S Srbljić, D Škvorc. 2012. ieeexplore.ieee.org MIPRO, 2012 Proceedings of the …6 cites.
  537. Integrity verification of outsourced XML databases“. R Liu, H Wang. 2009. ieeexplore.ieee.org … Science and Engineering, 2009. CSE’09 …6 cites.
  538. Laconic oblivious transfer and its applications“. C Cho, N Döttling, S Garg, D Gupta, P Miao…. 2017. Springer Annual International …6 cites.
  539. Proofs of ownership and retrievability in cloud storage“. R Du, L Deng, J Chen, K He…. 2014. ieeexplore.ieee.org Trust, Security and …6 cites.
  540. Proofs of Space-Time and Rational Proofs of Storage.“. T Moran, I Orlov. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive6 cites.
  541. QuasiModo: More Efficient Hash Tree-Based Certificate Revocation“. F Elwailly, Z Ramzan. 2003. Sep6 cites.
  542. SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains“. A Dvir, L Buttyan, TV Thong. 2013. ieeexplore.ieee.org Communications (ICC), 2013 …6 cites.
  543. Secure Block Device–Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems“. D Hein, J Winter, A Fitzek. 2015. ieeexplore.ieee.org Trustcom/BigDataSE/ISPA, 2015 …6 cites.
  544. Securing BGP through keychain-based signatures“. H Yin, B Sheng, H Wang, J Pan. 2007. ieeexplore.ieee.org Quality of Service, 2007 …6 cites.
  545. Seluge++: A secure over-the-air programming scheme in wireless sensor networks“. F Doroodgar, MA Razzaque, IF Isnin. 2014. mdpi.com Sensors6 cites.
  546. Slow but certain wins the race: authenticated bundle communication in delay tolerant networks“. W Itani, A Tajeddine, A Kayssi, A Chehab. 2010. dl.acm.org … of the 6th ACM workshop on …6 cites.
  547. Three-property preserving iterations of keyless compression functions“. E Andreeva, G Neven, B Preneel…. 2007. pdfs.semanticscholar.org ECRYPT Hash …6 cites.
  548. Tipping pennies? privately practical anonymous micropayments“. B Carbunar, Y Chen, R Sion. 2012. ieeexplore.ieee.org IEEE Transactions on …6 cites.
  549. Towards fast hardware memory integrity checking with skewed Merkle trees“. J Szefer, S Biedermann. 2014. dl.acm.org Proceedings of the Third Workshop on …6 cites.
  550. Track me if you can: Transparent obfuscation for Location based Services“. R Di Pietro, R Mandati, NV Verde. 2013. ieeexplore.ieee.org World of Wireless, Mobile …6 cites.
  551. Trusted transport mode based cluster-Merkle-tree for wireless sensor networks“. Z Quan, F Gui, D Xiao, J Li. 2010. ieeexplore.ieee.org Computer Application and System …6 cites.
  552. Two-level verification of data integrity for data storage in cloud computing“. G Xu, C Chen, H Wang, Z Zang, M Pang…. 2011. Springer Advanced Research on …6 cites.
  553. A case for near data security“. A Gundu, AS Ardestani, M Shevgoor…. 2014. cs.utah.edu Proc. 2nd Workshop …5 cites.
  554. A fast hash tree generator for Merkle signature scheme“. A Shoufan, N Huber. 2010. ieeexplore.ieee.org Circuits and Systems (ISCAS) …5 cites.
  555. A Key management SchemeBased on One Way Function Clustered sensor networks“. L Min, YIN Jian-Ping, WU Yong-an. 2008. en.cnki.com.cn Journal of computer research …5 cites.
  556. A secure round-based timestamping scheme with absolute timestamps (short paper)“. DP Le, A Bonnecaze, A Gabillon. 2008. Springer International Conference on Information …5 cites.
  557. A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks“. ES Babu, C Nagaraju, MHM Prasad. 2015. dl.acm.org Proceedings of the Sixth …5 cites.
  558. A space-and time-efficient Implementation of the Merkle Tree Traversal Algorithm“. M Knecht, W Meier, CU Nicola. 2014. arxiv.org arXiv preprint arXiv:1409.40815 cites.
  559. A survey of microarchitecture support for embedded processor security“. AK Kanuparthi, R Karri, G Ormazabal…. 2012. ieeexplore.ieee.org VLSI (ISVLSI), 2012 …5 cites.
  560. Algebraic construction for zero-knowledge sets“. R Xue, NH Li, JT Li. 2008. Springer Journal of Computer Science and Technology5 cites.
  561. Amortized e-cash“. M Liskov, S Micali. 2001. Springer International Conference on Financial Cryptography5 cites.
  562. An Access Control Scheme in Wireless Sensor Networks“. S Yu-long, MA Jian-feng…. 2007. ieeexplore.ieee.org Network and Parallel …5 cites.
  563. An efficient and scalable quasi-aggregate signature scheme based on LFSR sequences“. S Chakrabarti, S Chandrasekhar…. 2009. ieeexplore.ieee.org … on Parallel and …5 cites.
  564. An efficient scheme for secure communication in large-scale wireless sensor networks“. Z Su, C Lin, F Ren, Y Jiang…. 2009. ieeexplore.ieee.org … and Mobile Computing …5 cites.
  565. An infrastructure for long-term archiving of authenticated and sensitive electronic documents“. TA Ramos, N Da Silva, LC Lung, JG Kohler…. 2010. Springer European Public Key …5 cites.
  566. Bitcoin-based fair payments for outsourcing computations of fog devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier Future Generation Computer …5 cites.
  567. Bivariate polynomials modulo composites and their applications“. D Boneh, H Corrigan-Gibbs. 2014. Springer International Conference on the Theory and …5 cites.
  568. Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.“. QQ Xie, S Jiang, L Wang, CC Chang. 2016. pdfs.semanticscholar.org IJ Network Security5 cites.
  569. Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc networks“. L Sánchez-Casado, R Magán-Carrión…. 2014. books.google.com Security for Multihop …5 cites.
  570. Digital currency mining circuitry“. M Pauker, N Drego, V Kheterpal…. 2014. Google Patents US Patent App. 14/252,6135 cites.
  571. Disclosing verifiable partial information of signed CDA documents using generalized redactable signatures“. D Slamanig, C Stingl. 2009. ieeexplore.ieee.org e-Health Networking, Applications and …5 cites.
  572. Distributed immutabilization of secure logs“. J Cucurull, J Puiggalí. 2016. Springer International Workshop on Security and Trust …5 cites.
  573. Distributed node revocation based on cooperative security“. O Garcia, H Baldus. 2007. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems, 2007 …5 cites.
  574. Efficient distributed third-party data authentication for tree hierarchies“. H Yuan, MJ Atallah. 2008. ieeexplore.ieee.org … Computing Systems, 2008. ICDCS’08. The …5 cites.
  575. Efficient log authentication for forensic computing“. N Kawaguchi, N Obata, S Ueda…. 2005. ieeexplore.ieee.org … , 2005. IAW’05 …5 cites.
  576. Efficient Sparse Merkle Trees“. R Dahlberg, T Pulls, R Peeters. 2016. Springer Nordic Conference on Secure IT Systems5 cites.
  577. Faster file matching using GPGPUs“. D Mohan. 2010. dspace.udel.edu 5 cites.
  578. Fault-tolerant and secure networked storage“. MC Chan, JR Jiang, ST Huang. 2012. ieeexplore.ieee.org … Management (ICDIM), 2012 …5 cites.
  579. Helical entanglement codes: An efficient approach for designing robust distributed storage systems“. VE Galinanes, P Felber. 2013. Springer Symposium on Self-Stabilizing Systems5 cites.
  580. Hop: Hardware makes obfuscation practical“. K Nayak, C Fletcher, L Ren…. 2017. pdfs.semanticscholar.org 24th Annual …5 cites.
  581. Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection“. G Duc, R Keryell. 2008. Springer Journal in Computer Virology5 cites.
  582. Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks [J]“. T YUAN, JQ MA, YP ZHONG, SY ZHANG. 2010. en.cnki.com.cn Journal of Software5 cites.
  583. Lightweight authentication of freshness in outsourced key-value stores“. Y Tang, T Wang, L Liu, X Hu, J Jang. 2014. dl.acm.org Proceedings of the 30th Annual …5 cites.
  584. Method for distributed identification of a station in a network“. OG Morchon, B Erdmann, H Baldus. 2017. Google Patents US Patent 9,553,7265 cites.
  585. Method for distributing encryption means“. OG Morchon, MP Sillner, B Erdmann. 2014. Google Patents US Patent 8,837,7365 cites.
  586. Mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network“. S Jiang, J Miao, L Wang. 2011. ieeexplore.ieee.org Communication Software and …5 cites.
  587. On the key revocation schemes in wireless sensor networks“. D Mall, K Konaté, ASK Pathan. 2013. ieeexplore.ieee.org Green Computing and …5 cites.
  588. Performance and consistency improvements of hash tree based disk storage protection“. F Hou, D Gu, N Xiao, F Liu, H He. 2009. ieeexplore.ieee.org … , Architecture, and Storage …5 cites.
  589. Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage“. JR Bolannavar. 2014. academia.edu International Journal of Scientific Engineering and …5 cites.
  590. Proof of space from stacked expanders“. L Ren, S Devadas. 2016. Springer Theory of Cryptography Conference5 cites.
  591. Publicly verifiable conjunctive keyword search in outsourced databases“. M Azraoui, K Elkhiyaoui, M Önen…. 2015. ieeexplore.ieee.org … and Network Security …5 cites.
  592. Redactable signature schemes for trees with signer-controlled non-leaf-redactions“. H de Meer, HC Pöhls, J Posegga, K Samelin. 2012. Springer International Conference on …5 cites.
  593. Secure logging schemes and Certificate Transparency“. B Dowling, F Günther, U Herath, D Stebila. 2016. Springer European Symposium on …5 cites.
  594. Secure routing protocol for hybrid wireless mesh network (HWMN)“. D Bansal, S Sofat, G Singh. 2010. ieeexplore.ieee.org Computer and Communication …5 cites.
  595. Security challenges and opportunities in adaptive and reconfigurable hardware“. V Costan, S Devadas. 2011. ieeexplore.ieee.org … Security and Trust (HOST), 2011 IEEE …5 cites.
  596. Shorter hash-based signatures“. GCCF Pereira, C Puodzius, PSLM Barreto. 2016. Elsevier Journal of Systems and …5 cites.
  597. Sia: Simple Decentralized Storage“. D Vorick, L Champine. 2014. coss.io 5 cites.
  598. SinPack: A security protocol for preventing pollution attacks in network-coded content distribution networks“. W Itani, C Ghali, A El Hajj, A Kayssi…. 2010. ieeexplore.ieee.org … 2010), 2010 IEEE5 cites.
  599. Slightly improved merkle tree traversal for user authentication using pseudorandomly-generated leaves“. D Stebila. 2006. pdfs.semanticscholar.org University of Waterloo, ON, Canada5 cites.
  600. SMART POOL: Practical Decentralized Pooled Mining.“. L Luu, Y Velner, J Teutsch…. 2017. people.cs.uchicago.edu IACR Cryptology ePrint …5 cites.
  601. State of The Art and Hot Aspects in Cloud Data Storage Security“. N Paladi, C Gehrmann, F Morenius. 2013. diva-portal.org 5 cites.
  602. System and method for verifying the integrity and completeness of records“. WWS Hsu, X Ma. 2009. Google Patents US Patent 7,606,7955 cites.
  603. The concept of secure processes for Linux on the CryptoPage/x86 secure architecture“. G Duc, R Keryell. 2005. researchgate.net 20th ACM Symposium on Operating Systems …5 cites.
  604. Threshold signature for distributed time stamping scheme“. A Bonnecaze, P Trebuchet. 2007. Springer Annals of telecommunications5 cites.
  605. Towards verifiable parallel content retrieval“. W Wong, MF Magalhäes…. 2010. ieeexplore.ieee.org … Protocols (NPSec), 2010 …5 cites.
  606. Updatable key management scheme with intrusion tolerance for unattended wireless sensor network“. L Wang, T Jiang, X Zhu. 2011. ieeexplore.ieee.org … Conference (GLOBECOM 2011) …5 cites.
  607. WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.“. T Li, X Ma, N Li. 2009. Springer ESORICS5 cites.
  608. … ‘an Communication College, Xi’an 710106, China); Strategy for Broadcast Authentication in Wireless Sensor Networks Based on Hierarchical Merkle Tree …“. Y JIANG, H SHI, H ZHAO. 2007. Journal of System Simulation4 cites.
  609. A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission“. A Katal, M Wazid, RH Goudar…. 2013. ieeexplore.ieee.org … Technologies (ICT), 2013 …4 cites.
  610. A cluster-based random key revocation protocol for wireless sensor networks“. Y Jiang, HS Shi. 2008. ccs.asia.edu.tw Journal of Electronic Science and Technology4 cites.
  611. A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications“. D Zheng, H Tang, FR Yu. 2012. ieeexplore.ieee.org … CONFERENCE, 2012-MILCOM …4 cites.
  612. A new encryption and hashing scheme for the security architecture for microprocessors“. J Platte, RD Díaz, E Naroska. 2006. Springer Communications and Multimedia Security4 cites.
  613. A Note on Traversing skew merkle trees“. M Karpiński, Y Nekritch. 2004. Inst. für Informatik 4 cites.
  614. A position-aware Merkle tree for dynamic cloud data integrity verification“. J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu. 2017. Springer Soft Computing4 cites.
  615. A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid“. ACF Chan, J Zhou. 2015. ieeexplore.ieee.org IEEE Transactions on Intelligent …4 cites.
  616. An authentication protocol for sensor networks using pairings“. M Salinas, G Gallegos, G Duchén. 2009. ieeexplore.ieee.org … , and Computers, 2009 …4 cites.
  617. An Efficient Dynamic Proof of Retrievability Scheme“. Z Mo, Y Zhou, S Chen. 2013. cise.ufl.edu ZTE Communications4 cites.
  618. An efficient post-quantum one-time signature scheme“. K Kalach, R Safavi-Naini. 2015. Springer International Conference on Selected Areas in …4 cites.
  619. Asynchronous large-scale certification based on certificate verification trees“. J Domingo-Ferrer, M Alba, F Sebé. 2001. Springer … and Multimedia Security Issues of the …4 cites.
  620. Authenticated index structures for outsourced databases“. F Li, M Hadjileftheriou, G Kollios, L Reyzin. 2008. Springer Handbook of Database …4 cites.
  621. Authentication of sensor network flooding based on neighborhood cooperation“. T Zhou, K Chakrabarty. 2006. ieeexplore.ieee.org Wireless Communications and …4 cites.
  622. Bringing secure Bitcoin transactions to your smartphone“. D Frey, MX Makkes, PL Roman, F Taïani…. 2016. dl.acm.org Proceedings of the 15th …4 cites.
  623. Computing: Secure the internet“. B Laurie, C Doctorow. 2012. nature.com Nature4 cites.
  624. Cross and clean: Amortized garbled circuits with constant overhead“. JB Nielsen, C Orlandi. 2016. Springer Theory of Cryptography Conference4 cites.
  625. Decim: Detecting endpoint compromise in messaging“. J Yu, M Ryan, C Cremers. 2017. ieeexplore.ieee.org IEEE Transactions on Information …4 cites.
  626. DMSS-动态 Merkle 可信树签名方案“. 蔡永泉, 刘芳. 2009. 电子学报4 cites.
  627. Efficient asynchronous accumulators for distributed PKI“. L Reyzin, S Yakoubov. 2016. Springer … Conference on Security and Cryptography for …4 cites.
  628. Efficient broadcast authentication in wireless sensor networks“. Z Du, K Wang, L Zhou. 2008. ieeexplore.ieee.org Asia-Pacific Services Computing …4 cites.
  629. Efficient record-level keyless signatures for audit logs“. A Buldas, A Truu, R Laanoja, R Gerhards. 2014. Springer Nordic Conference on Secure …4 cites.
  630. Fern: An updatable authenticated dictionary suitable for distributed caching“. E Freudenthal, D Herrera, S Gutstein, R Spring…. 2007. Springer … Methods, Models, and …4 cites.
  631. Fighting mallory the insider: Strong write-once read-many storage assurances“. R Sion, Y Chen. 2012. ieeexplore.ieee.org IEEE Transactions on Information Forensics …4 cites.
  632. Formal verification of smart contracts“. K Bhargavan, A Delignat-Lavaud…. 2016. antoine.delignat-lavaud.fr Proceedings of the …4 cites.
  633. From stateful hardware to resettable hardware using symmetric assumptions“. N Döttling, D Kraschewski, J Müller-Quade…. 2015. Springer … Conference on Provable …4 cites.
  634. High-performance qualified digital signatures for X-road“. A Ansper, A Buldas, M Freudenthal…. 2013. Springer Nordic Conference on …4 cites.
  635. IndexTree: An Efficient Tamper-Evidence Logging“. Y Bao, Y Wang, Z Luan, X Pei…. 2010. ieeexplore.ieee.org … (HPCC), 2010 12th IEEE …4 cites.
  636. Introduction“. DA Tran. 2012. Springer Data Storage for Social Networks4 cites.
  637. Ivec: off-chip memory integrity protection for both security and reliability“. R Huang, GE Suh. 2010. dl.acm.org ACM SIGARCH Computer Architecture News4 cites.
  638. Key establishment between heterogenous nodes in wireless sensor and actor networks“. B Yu, J Ma, Z Wang, D Mao, C Gao. 2006. Springer Advanced Web and Network …4 cites.
  639. Light-weight, runtime verification of query sources“. T Ge, S Zdonik. 2009. ieeexplore.ieee.org Data Engineering, 2009. ICDE’09. IEEE 25th …4 cites.
  640. Minimal trusted computing base for MANET nodes“. V Thotakura, M Ramkumar. 2010. ieeexplore.ieee.org Wireless and Mobile Computing …4 cites.
  641. Optimization of Tree Modes for Parallel Hash Functions: A Case Study“. K Atighehchi, R Rolland. 2017. ieeexplore.ieee.org IEEE Transactions on Computers4 cites.
  642. Practical broadcast authentication protocol for sensor networks [J]“. Z DU, Y SHEN, J MA, L ZHOU. 2010. en.cnki.com.cn Journal of Xidian University4 cites.
  643. Proof of Space from Stacked Bipartite Graphs.“. L Ren, S Devadas. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive4 cites.
  644. Proofs of Proofs of Work with Sublinear Complexity“. A Kiayias, N Lamprou, AP Stouka. 2016. Springer International Conference on Financial …4 cites.
  645. Public key signatures and lightweight security solutions in a wireless environment“. D Lagutin, S Tarkoma. 2009. Springer Smart Spaces and Next Generation Wired …4 cites.
  646. Public-key Primitives“. L Batina, S Seys, B Preneel…. 2008. cosic.esat.kuleuven.be Wireless sensor …4 cites.
  647. Realizing Digital Signatures with One-Way Hash Functions“. C Ruland. 1993. Taylor & Francis Cryptologia4 cites.
  648. Scalable Byzantine-Fault-Quantifying Clock Synchronization“. J Douceur, J Howell, JJD Douceur. 2003. microsoft.com 4 cites.
  649. Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage“. D Koo, J Hur, H Yoon. 2014. Springer Frontier and Innovation in Future Computing and …4 cites.
  650. Secure disk with authenticated encryption and IV verification“. F Hou, N Xiao, F Liu, H He. 2009. ieeexplore.ieee.org … and Security, 2009. IAS’09. Fifth …4 cites.
  651. Secure program update using broadcast encryption for clustered wireless sensor networks“. MB Nirmala, AS Manjunath. 2010. ieeexplore.ieee.org Wireless Communication and …4 cites.
  652. Signtiming scheme based on aggregate signature“. DP Le, A Bonnecaze, A Gabillon. 2008. ieeexplore.ieee.org Intelligence and Security …4 cites.
  653. Strategy for broadcast au-thentication in wireless sensor networks based on hierarchical merkle tree“. J Yi, S Hao-shan, Z Hong-gang. 2007. Journal of System Simulation4 cites.
  654. The Evolution of Global Scale Filesystems for Scientific Software Distribution“. J Blomer, P Buncic, R Meusel, G Ganis…. 2015. aip.scitation.org Computing in Science …4 cites.
  655. Tradeoffs between jamming resilience and communication efficiency in key establishment“. D Slater, R Poovendran, P Tague, BJ Matt. 2009. dl.acm.org ACM SIGMOBILE Mobile …4 cites.
  656. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm“. B Dong, R Liu, HW Wang. 2016. ieeexplore.ieee.org IEEE Transactions on Services …4 cites.
  657. Update-Optimal Authenticated Structures Based on Lattices.“. C Papamanthou, R Tamassia. 2010. eprint.iacr.org IACR Cryptology ePrint Archive4 cites.
  658. A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks“. F Wang, Y Zhang, Y Xu, L Wu…. 2014. ieeexplore.ieee.org … (ICNC), 2014 International …3 cites.
  659. A Dynamic Public Auditing Security Scheme To Preserve Privacy In Cloud Storage“. BK Thomas, MN Rajkumar. 2013. IJSHJE 3 cites.
  660. A multiple-MAC-based protocol to identify misbehaving nodes in network coding“. JC Corena, T Ohtsuki. 2012. ieeexplore.ieee.org Vehicular Technology Conference (VTC …3 cites.
  661. A multi-signature for time stamping scheme“. A Bonnecaze. 2006. … bonnecaze.perso.luminy.univ-amu.fr SAR/SSI3 cites.
  662. A new totally ordered timestamping scheme“. K Blibech, A Gabillon. 2006. researchgate.net 5th Conference on Security and Network …3 cites.
  663. A Node Revocation Scheme for Sensor Networks.“. PJ Chuang, TH Chao. 2006. actapress.com Wireless and Optical Communications3 cites.
  664. A novel rekeying message authentication procedure based on Winternitz OTS and reconfigurable hardware architectures“. A Shoufan, SA Huss, O Kelm…. 2008. ieeexplore.ieee.org … Computing and FPGAs …3 cites.
  665. A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices“. T Kandappu, V Sivaraman…. 2012. ieeexplore.ieee.org Sensor, Mesh and Ad Hoc …3 cites.
  666. A proposal for mitigating multiple black-hole attack in wireless mesh networks“. O Shree, FJ Ogwu. 2013. researchgate.net Wireless Sensor Network3 cites.
  667. A Survey on the Key Management Schemes for Wireless Sensor Networks [J]“. M LI, J YIN, Y WU, J CHENG. 2008. en.cnki.com.cn Computer Engineering & Science3 cites.
  668. Adaptive security established on the requirements and resource abilities of network nodes“. F Samad, SA Makram. 2010. ieeexplore.ieee.org … (LCN), 2010 IEEE 35th Conference on3 cites.
  669. Addendum to scalable secure storage when half the system is faulty“. N Alon, H Kaplan, M Krivelevich, D Malkhi…. 2004. math.tau.ac.il Information and …3 cites.
  670. An efficient authentication and simplified certificate status management for personal area networks“. C Sur, KH Rhee. 2006. Springer Asia-Pacific Network Operations and Management …3 cites.
  671. An efficient distributed currency“. B Laurie. 2011. links.org Practice3 cites.
  672. An efficient group key agreement scheme for MANETs based on Merkle identity tree“. L Chen, R Hu. 2010. ieeexplore.ieee.org … (WCSE), 2010 Second World Congress on3 cites.
  673. An Efficient Trusted Computing Base (TCB) for a SCADA System Monitor“. A Velagapalli, M Ramkumar. 2011. pdfs.semanticscholar.org submitted to the ACM/IEEE …3 cites.
  674. An efficient trusted computing base for MANET security“. SD Mohanty, V Thotakura…. 2014. researchgate.net Journal of Information …3 cites.
  675. An Improved Memory Integrity Protection Scheme.“. Y Hu, B Sunar. 2010. Springer TRUST3 cites.
  676. An optimized adaptive algorithm for authentication of safety critical messages in VANET“. A Smitha, MMM Pai, N Ajam…. 2013. ieeexplore.ieee.org … and Networking in China …3 cites.
  677. Authenticating email search results“. O Ohrimenko, H Reynolds, R Tamassia. 2012. Springer International Workshop on …3 cites.
  678. Authentication of reverse k nearest neighbor query“. G Li, C Luo, J Li. 2015. Springer International Conference on Database Systems for …3 cites.
  679. Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.“. MAG Vigil, D Cabarcas, A Wiesmaier…. 2012. academia.edu IACR Cryptology ePrint …3 cites.
  680. Backing up your data to the cloud: Want to pay less?“. Y Zhu, J Masui. 2013. ieeexplore.ieee.org … ICPP), 2013 42nd International Conference on3 cites.
  681. Beacon certificate push revocation“. JA Solworth. 2008. dl.acm.org Proceedings of the 2nd ACM workshop on Computer …3 cites.
  682. Behind the scenes of web services negotiation and agreement“. PCK Hung, LJ Zhang. 2004. pdfs.semanticscholar.org Int J Web Serv Res (JWSR)3 cites.
  683. Bitcoin and decentralized trust protocols“. R Pérez-Marco. 2016. arxiv.org arXiv preprint arXiv:1601.052543 cites.
  684. Bitcoin protocol specification“. K Okupski. 0. pdfs.semanticscholar.org3 cites.
  685. Blockchain Electronic Vote“. P Noizat. 2015. books.google.com Handbook of Digital Currency: Bitcoin, Innovation …3 cites.
  686. Broadcast authentication algorithm for wireless sensor networks“. XX Yao, XF Zheng, XW Zhou. 2010. en.cnki.com.cn Journal of China Institute of …3 cites.
  687. Broadcast authentication for resource constrained devices: A major pitfall and some solutions“. R Di Pietro, F Martinelli…. 2012. ieeexplore.ieee.org … Distributed Systems (SRDS …3 cites.
  688. C. Nicola,” A space-and timeefficient Implementation of the Merkle Tree Traversal Algorithm“. M Knecht, W Meier. 0. Computing Research Repository (CoRR)3 cites.
  689. Cleaning up the PKI for long-term signatures“. MAG Vigil, RF Custódio…. 2012. www-old.cdc.informatik.tu-darmstadt … … e de Sistemas …3 cites.
  690. Cloud storage using merkle trees“. N Parab, A Brown. 2015. Google Patents US Patent App. 14/977,6073 cites.
  691. Communication Security: An Introduction to Cryptography“. S Vaudenay. 2004. Course notes3 cites.
  692. Decentralizing authorities into scalable strongest-link cothorities“. E Syta, I Tamas, D Visher…. 2015. pdfs.semanticscholar.org CoRR, abs …3 cites.
  693. Defense against packet dropping attacks in opportunistic networks“. M Alajeely, R Doss. 2014. ieeexplore.ieee.org Advances in Computing …3 cites.
  694. Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks“. M Rameshkumar, CSG Dhass. 2012. academia.edu International Journal of Advanced …3 cites.
  695. Efficient flexible batch signing techniques for imbalanced communication applications“. TY Youn, YH Park, T Kwon, S Kwon…. 2008. search.ieice.org … on Information and …3 cites.
  696. Fawkescoin“. J Bonneau, A Miller. 2014. Springer Cambridge International Workshop on Security …3 cites.
  697. Guest editorial: Smart grid communications systems“. SL Kim, P Kitsos, M Nekovee, FR Yu…. 2014. ieeexplore.ieee.org IEEE Systems …3 cites.
  698. Hash Function Design Using Matrix Multiplication Ex-or Checksum Generation and Compression Technique Approach“. SG Srikantaswamy, HD Phaneendra. 2013. ijcsits.org International Journal of Computer …3 cites.
  699. Implementation of a broadcast authentication mechanism in ZigBee“. JT Shieh, L chun Ko. 2006. acnlab.csie.ncu.edu.tw The 2nd Workshop on Wireless, Ad …3 cites.
  700. Improved remote attestation mechanism based on group signatures and unbalanced Merkle hash tree“. D Fu, G Chen. 2013. JOURNAL OF INFORMATION &COMPUTATIONAL …3 cites.
  701. Improving smart grid security using Merkle Trees“. MC Muñoz, M Moh, TS Moh. 2014. ieeexplore.ieee.org Communications and Network …3 cites.
  702. Leveled group key management for wireless sensor networks“. L Fenghua, MJ WangWei. 2008. Chinese Journal of Electronics3 cites.
  703. Making bitcoin exchanges transparent“. C Decker, J Guthrie, J Seidel, R Wattenhofer. 2015. Springer European Symposium on …3 cites.
  704. Memory integrity protection method based on asymmetric hash tree“. M Haifeng, C Jie, G Zhenguo. 2014. ieeexplore.ieee.org Distributed Computing and …3 cites.
  705. Merkle tree traversal in log space and time (preprint, 2003)“. M Szydlo. 0. . 3 cites.
  706. Merkle tree traversal revisited. Manuscript, 2008“. J Buchmann, E Dahmen, M Schneider. 2008. . 3 cites.
  707. Method and apparatus for graph-based partition of cryptographic functionality“. BM Jakobsson, BS Kaliski Jr. 2010. Google Patents US Patent 7,730,5183 cites.
  708. Method and apparatus for secure and small credits for verifiable service provider metering“. CB Gentry, ZA Ramzan. 2010. Google Patents US Patent 7,783,5793 cites.
  709. Minimizing the TCB for securing SCADA systems“. A Velagapalli, M Ramkumar. 2011. dl.acm.org … of the Seventh Annual Workshop on …3 cites.
  710. Modeling integrity in data exchange“. G Miklau, D Suciu. 2004. Springer Workshop on Secure Data Management3 cites.
  711. More on castor: the scalable secure routing protocol for ad-hoc networks“. W Galuba, P Papadimitratos, M Poturalski, K Aberer…. 2009. pdfs.semanticscholar.org 3 cites.
  712. Node cooperation and message authentication in trusted mobile ad hoc networks“. A Vijayakumar, K Selvamani. 2014. researchgate.net International Journal of Engineering …3 cites.
  713. On the performance and use of a space-efficient merkle tree traversal algorithm in real-time applications for wireless and sensor networks“. D Berbecaru, L Albertalli. 2008. ieeexplore.ieee.org Networking and Communications …3 cites.
  714. Optimized source authentication scheme for multicast based on Merkle Tree and TESLA“. Y Li, M Zhang, Y Guo, G Xu. 2010. ieeexplore.ieee.org Information Theory and …3 cites.
  715. Platform Integrity Attestation Based on Time [J]“. G XU, C CHANG, J HUANG, D GU. 2009. en.cnki.com.cn Computer Engineering3 cites.
  716. Privacy and integrity preserving skyline queries in tiered sensor networks“. J Li, Y Lin, G Wang, R Li, B Yin. 2014. Wiley Online Library Security and Communication …3 cites.
  717. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing“. D Koo, J Hur. 2018. Elsevier Future Generation Computer Systems3 cites.
  718. Random sampling key revocation scheme for distributed sensor networks“. Y Xue, H Jürgensen. 2009. dl.acm.org Proceedings of the 2nd International Conference …3 cites.
  719. Real-world post-quantum digital signatures“. D Butin, SL Gazdag, J Buchmann. 2015. Springer Cyber Security and Privacy Forum3 cites.
  720. Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure“. N Emmadi, H Narumanchi. 2017. dl.acm.org … of the 18th International Conference on …3 cites.
  721. Relating Boolean gate truth tables to one-way functions“. M Gomathisankaran, A Tyagi. 2009. content.iospress.com Integrated Computer-Aided …3 cites.
  722. Relating Boolean gate truth tables to one-way functions“. M Gomathisankaran, A Tyagi. 2009. content.iospress.com Integrated Computer-Aided …3 cites.
  723. Rolling boles, optimal XML structure integrity for updating operations“. S Graf, SK Belle, M Waldvogel. 2011. dl.acm.org Proceedings of the 20th international …3 cites.
  724. Scalable and secure private set intersection for big data“. C Hahn, J Hur. 2016. ieeexplore.ieee.org Big Data and Smart Computing (BigComp) …3 cites.
  725. Secure distributed data storage in cloud computing“. Y Chen, WEIS KU, J Feng, P Liu…. 2011. pdfs.semanticscholar.org … and Paradigms. John …3 cites.
  726. Secure Knowledge Management“. B Thuraisingham. 2004. pdfs.semanticscholar.org Secure Knowledge Management …3 cites.
  727. Securing layer-2 path selection in wireless mesh networks“. MS Islam, MA Hamid, BG Choi, CS Hong. 2008. Springer International Workshop on …3 cites.
  728. Security of wireless sensor networks and analysis on efficient broadcast authentication“. M Rameshkumar, DCSG Dhass. 2012. pdfs.semanticscholar.org International Journal of …3 cites.
  729. Survey of Privacy and Authentication Schemes for Ad Hoc Networks“. RL Hu, JW Liu, QS Zhang. 2007. en.cnki.com.cn Jisuanji Gongcheng/ Computer …3 cites.
  730. Time-stamping“. S Haber, H Massias. 2005. Springer Encyclopedia of Cryptography and Security3 cites.
  731. Trusted cvs“. M Venkitasubramaniam…. 2006. ieeexplore.ieee.org Data Engineering …3 cites.
  732. Using hash-based signatures to bootstrap quantum key distribution“. S Kunz-Jacques, P Jouguet. 2011. arxiv.org arXiv preprint arXiv:1109.28443 cites.
  733. Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes.“. C Hanser, D Slamanig. 2013. Springer INDOCRYPT3 cites.
  734. XOR network coding pollution prevention without homomorphic functions“. JC Corena, A Basu, S Kiyomoto…. 2014. ieeexplore.ieee.org … (CCNC), 2014 IEEE …3 cites.
  735. Zcash Protocol Specification“. D Hopwood, S Bowe, T Hornby, N Wilcox. 2016. raw.githubusercontent.com 3 cites.
  736. 해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜“. 신기은, 최형기. 2009. 정보처리학회논문지 C, 제 16-C 권3 cites.
  737. A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …2 cites.
  738. A distributed time stamping scheme“. B Alexis, L Pierre, G Alban, B Kaouther. 2005. eurecom.fr Research Report2 cites.
  739. A high efficiency protocol for reporting integrity measurements“. C Chaowen, H Rongyu, X Hui…. 2008. ieeexplore.ieee.org … Systems Design and …2 cites.
  740. A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks“. Y Jiang, R Zhang, X Du. 2013. ieeexplore.ieee.org Parallel and Distributed Computing …2 cites.
  741. A New Group Key Exchange Protocol Based on Zero-Knowledge Set“. S Haibo, L Dongdai, X Rui. 2006. docsdrive.com Asian Journal of Information Technology2 cites.
  742. A novel cryptoprocessor architecture for chained Merkle signature scheme“. A Shoufan, N Huber, HG Molter. 2011. Elsevier Microprocessors and Microsystems2 cites.
  743. A performance boost for hash-based signatures“. T Eisenbarth, I von Maurich, C Paar, X Ye. 2013. Springer Number Theory and …2 cites.
  744. A query verification method for making outsourced databases trustworthy“. Y Zhou, C Wang. 2012. ieeexplore.ieee.org Services Computing (SCC), 2012 IEEE Ninth …2 cites.
  745. A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage“. NM Joseph, E Daniel, NA Vasanthi. 2013. International Journal of Advanced Research in …2 cites.
  746. A Secure Hardware Abstraction for Distributed Systems“. TTA Dinh, M Ryan. 2010. School of Computer Science … 2 cites.
  747. A Secure Routing Protocol for Wireless Sensor Networks [J]“. C Wei-honga, X Wei-chub. 2008. en.cnki.com.cn Journal of Hunan City University …2 cites.
  748. A survey on distributed file system technology“. J Blomer. 2015. iopscience.iop.org Journal of Physics: Conference Series2 cites.
  749. A Tamper-Detecting Implementation of Lisp.“. D Heimbigner. 2003. pdfs.semanticscholar.org Security and Management2 cites.
  750. All about Eve: Execute-verify replication for multicore servers (extended version)“. M Kapritsos, Y Wang, V Quema, A Clement…. 2012. … Report TR-12-23, Department of … 2 cites.
  751. An Efficient Approach for Merkle Tree Traversal“. X Tian, Y Peng, H Li, W Wei, Y Wang. 2012. JOURNAL OF INFORMATION …2 cites.
  752. An Efficient Scheme to Provide Real-time Memory Integrity Protection“. Y Hu. 2009. pdfs.semanticscholar.org 2 cites.
  753. An Efficient TCB for a Generic Content Distribution System“. SD Mohanty, A Velagapalli…. 2012. ieeexplore.ieee.org Cyber-Enabled …2 cites.
  754. An investigation of the Merkle signature scheme for cryptographically generated address signatures in mobile IPv6“. S Qadir, MU Siddiqi…. 2015. ijns.jalaxy.com.tw International Journal of …2 cites.
  755. Applied Cryptography“. J LIU, D REN, Y HU. 2008. Tsinghua University Press 2 cites.
  756. Asymptotic analysis of plausible tree hash modes for sha-3“. K Atighehchi, A Bonnecaze. 2017. arxiv.org arXiv preprint arXiv:1708.056802 cites.
  757. Authenticated Index Structures for Outsourced Database Systems“. F Li, M Hadjieleftheriou, G Kollios, L Reyzin. 2006. dcommon.bu.edu 2 cites.
  758. Authentication schemes for VANETs: a survey“. A Das, D Roychoudhury…. 2013. inderscienceonline.com … Journal of Vehicle …2 cites.
  759. Automated software configuration management“. J Whitney, I Carmel, S Yount. 2015. Google Patents US Patent App. 14/611,0242 cites.
  760. Bitcoin: An Empirical Study of Cryptocurrency“. E Rosen, E Wengrowski, GD Clark, X Gao. 2014. ericwengrowski.com 2 cites.
  761. Black Hole Attack in MANETs Preventions and Advancements: A Review“. K Kumar, TS Aulakh. 2016. pdfs.semanticscholar.org International Journal of Computer …2 cites.
  762. Black Hole Attack in MANETs Preventions and Advancements: A Review“. K Kumar, TS Aulakh. 2016. pdfs.semanticscholar.org International Journal of Computer …2 cites.
  763. Brief announcement: Distributed trust management and revocation“. D Kuptsov, A Gurtov, O Garcia-Morchon…. 2010. dl.acm.org Proceedings of the 29th …2 cites.
  764. Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems“. F Hou, H He, N Xiao, F Liu. 2013. Elsevier Future Generation Computer Systems2 cites.
  765. C++ implementation of a hash-based digital signature scheme using fractal Merkle tree representation“. DF Coluccio. 2003. . 2 cites.
  766. Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?“. A Buldas, M Niitsoo. 2008. Springer International Conference on Provable Security2 cites.
  767. Counterexamples to hardness amplification beyond negligible“. Y Dodis, A Jain, T Moran, D Wichs. 2012. Springer Theory of Cryptography Conference2 cites.
  768. Cryptographic algorithms and protocols for security and privacy in wireless ad hoc networks“. S Seys. 2006. … University Leuven Secure Communications:’End-to …2 cites.
  769. Data Integrity and Message Authentication“. CH Gebotys. 2010. Springer Security in Embedded Devices2 cites.
  770. DDoS Attacks using P2P Networks“. P Kohli, U Ganugula. 2007. researchweb.iiit.ac.in International Institute of Information …2 cites.
  771. Design of cross-layer security for wireless sensor network’s“. G YANG, C CHEN, M XIAO. 2007. en.cnki.com.cn Transducer and Microsystem …2 cites.
  772. Detection of wormhole attacks on IPv6 mobility-based wireless sensor network“. GH Lai. 2016. Springer EURASIP Journal on Wireless Communications and …2 cites.
  773. DMSS-Dynamic Merkle Authentication-tree Signature“. Y CAI, F LIU. 2009. en.cnki.com.cn Acta Electronica Sinica2 cites.
  774. Dynamic proofs of retrievability from Chameleon-Hashes“. S Rass. 2013. ieeexplore.ieee.org Security and Cryptography (SECRYPT), 2013 …2 cites.
  775. Dynamic remote attestation model in real-time monitoring [J]“. N Wang, ZQ Wu, XP Fu. 2011. en.cnki.com.cn Application Research of Computers2 cites.
  776. Efficient cloud computing with secure data storage using AES“. SP Jadhav, BR Nandwalkar. 2015. pdfs.semanticscholar.org International Journal of …2 cites.
  777. Efficient Hash-Based Signatures on Embedded Devices“. S Rohde, T Eisenbarth…. 2008. cdc.informatik.tu-darmstadt.de SECSI-Secure …2 cites.
  778. Electronic Contract Signing Without Using Trusted Third Party“. Z Wan, RH Deng, D Lee. 2015. Springer … Conference on Network and System Security2 cites.
  779. Encryption scheme supporting secure in-network processing for WSNs“. YA Zhao, FB Wang, WJ Duan. 2007. en.cnki.com.cn Jisuanji Yingyong Yanjiu …2 cites.
  780. Encryption scheme supporting secure in-network processing for WSNs“. YA Zhao, FB Wang, WJ Duan. 2007. en.cnki.com.cn Jisuanji Yingyong Yanjiu …2 cites.
  781. Enhanced authentication for outsourced educational contents through provable block possession“. C Hahn, H Kwon, D Kim, J Hur. 2016. Springer Multimedia Tools and Applications2 cites.
  782. Ensuring dynamic data integrity based on variable block-size BLS in untrusted environment“. L Chen, W Song, S Yiu, W Luo. 2013. Advanced Institutes of Convergence … International …2 cites.
  783. FEDTIC: A security design for embedded systems with insecure external memory“. M Hong, H Guo. 2010. Springer Future Generation Information Technology2 cites.
  784. Fractal Merkle Tree representation and Traversal. Topics in Cryptology-CT-RSA 2003, 314–326“. M Jakobson, FT Leighton, S Micali, M Szydlo. 2003. Springer2 cites.
  785. Guaranteeing memory integrity in secure processors with Dynamic Trees“. S Khanvilkar. 0. pdfs.semanticscholar.org ECE594–Advance computer architecture, Final …2 cites.
  786. High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems“. R Vaslin, G Gogniat, JP Diguet…. 2007. hal.archives-ouvertes.fr … on engineering of …2 cites.
  787. High throughput asynchronous algorithms for message authentication“. SA Crosby, DS Wallach. 2010. tamperevident.cs.rice.edu 2 cites.
  788. High throughput asynchronous algorithms for message authentication“. SA Crosby, DS Wallach. 2010. tamperevident.cs.rice.edu 2 cites.
  789. How to detect unauthorised usage of a key.“. J Yu, M Ryan, C Cremers. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …2 cites.
  790. HTSS: Hash Tree Signature Scheme for Multicast Authentication“. K Balasubramanian, R Roopa. 2012. pdfs.semanticscholar.org … Conference on Recent …2 cites.
  791. Implementation of an evidentiary record validation utility and security analysis for Surety’s AbsoluteProof“. M Thimblin, NSC Kamisetty, P Raman, A Paila. 2005. ece.gmu.edu 2 cites.
  792. Improving smart grid authentication using Merkle Trees“. MC Muñoz, M Moh, TS Moh. 2014. ieeexplore.ieee.org Parallel and Distributed Systems …2 cites.
  793. M. Schneider,” Merkle Tree Traversal Revisited“. J Buchmann, E Dahmen. 0. Lecture Notes in Computer Science2 cites.
  794. Merkle Hash tree based deduplication in cloud storage“. CL Li, Y Chen. 2014. Trans Tech Publ Applied Mechanics and Materials2 cites.
  795. Merkle tree of open transactions for lite mode? bitcointalk. org“. G Maxwell. 2011. June 2 cites.
  796. Merkle Tree Patent“. R Merkle. 1979. US4309569A 2 cites.
  797. Merkle tree reference counts“. R Ruef, K Everson, N Dalmatov, WC Biester. 2013. Google Patents US Patent 8,457,0182 cites.
  798. Merkle tree traversal in log space and time (preprint version), 2003“. M Szydlo. 2003. . 2 cites.
  799. Merkle tree traversal in log space and time. 2003“. M Szydlo. 0. Preprint, available at http://www. szydlo. com2 cites.
  800. Merkle trees“. B Carminati. 2009. Springer Encyclopedia of Database Systems2 cites.
  801. Message and its origin authentication protocol for data aggregation in sensor networks“. HK Lee, DH Nyang, JS Song. 2006. Springer International Conference on Embedded and …2 cites.
  802. Method Based on DCT transform to Resist Printing and Scanning Attack on Digital Seal [J]“. J SHI, J FAN. 2011. en.cnki.com.cn Modern Electronics Technique2 cites.
  803. Missive: Fast Application Launch From an Untrusted Buffer Cache.“. J Howell, J Elson, B Parno, JR Douceur. 2014. usenix.org USENIX Annual Technical …2 cites.
  804. MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications“. Y Wang, Y Shen, H Wang, J Cao…. 2016. ieeexplore.ieee.org IEEE Transactions on …2 cites.
  805. NDN DeLorean: An authentication system for data archives in named data networking“. Y Yu, A Afanasyev, L Zhang. 2016. pdfs.semanticscholar.org NDN, San Diego, CA, USA …2 cites.
  806. New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms“. MAE Jenifer, MS Karthigaiveni. 2016. ripublication.com International Journal of Applied …2 cites.
  807. On Detection of Bitcoin mining redirection attacks“. NT Courtois, P Emirdag, Z Wang. 2015. ieeexplore.ieee.org Information Systems Security …2 cites.
  808. Optimal Trade-Off for Merkle Tree“. P Berman, M Karpinski, Y Nekrich. 2004. rapport no TR04-049, juin2 cites.
  809. Performance of two one-time signature schemes in space/time constrained environments“. D Berbecaru. 2010. ieeexplore.ieee.org … Pervasive Computing (ISWPC), 2010 5th IEEE …2 cites.
  810. Polish concepts for securing e-government document flow“. M Kutyłowski, P Kubiak. 2011. Springer ISSE 2010 Securing Electronic Business …2 cites.
  811. Poster: a geometric approach for multicast authentication in adversarial channels“. SA Ahmadzadeh, GB Agnew. 2011. dl.acm.org Proceedings of the 18th ACM conference …2 cites.
  812. Poster: a geometric approach for multicast authentication in adversarial channels“. SA Ahmadzadeh, GB Agnew. 2011. dl.acm.org Proceedings of the 18th ACM conference …2 cites.
  813. Protocols for public key cryptosystems“. RC Merkle. 1981. Commun. Ass. Comput. Mach.2 cites.
  814. Proving properties of incremental merkle trees“. M Ogawa, E Horita, S Ono. 2005. Springer CADE2 cites.
  815. Redactable signature scheme for tree-structured data based on merkle tree“. S Hirose, H Kuwakado. 2013. ieeexplore.ieee.org Security and Cryptography (SECRYPT …2 cites.
  816. Redactable signatures on data with dependencies“. D Bauer, DM Blough, A Mohan. 2009. smartech.gatech.edu 2 cites.
  817. Reliable Resource Searching in P2P Networks“. MT Goodrich, JZ Sun, R Tamassia…. 2009. Springer … Conference on Security …2 cites.
  818. Remote attestation scheme based on Merkle tree [J]“. QGLZZ Lihua. 2010. en.cnki.com.cn Journal of Huazhong University of Science and …2 cites.
  819. Research on key management in Wireless Sensor Network“. LJ Yang, DC Huang, YP Li. 2008. en.cnki.com.cn Journal of Changsha Communications …2 cites.
  820. Rethinking global analyses and algorithms for comparative genomics in a functional MapReduce style“. N Golenetskaya, DJ Sherman. 2011. hal.archives-ouvertes.fr SeqBio 20112 cites.
  821. Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.“. T Calderon, S Meiklejohn, H Shacham, B Waters. 2014. books.google.com CT-RSA2 cites.
  822. Review of Bitcoin Scaling Proposals“. B Bishop. 2015. scalingbitcoin.org Scaling Bitcoin Workshop Phase2 cites.
  823. Role based privacy-aware secure routing in WMNs“. H Lin, J Hu, A Nagar, L Xu. 2012. ieeexplore.ieee.org Trust, Security and Privacy in …2 cites.
  824. Secure key-insulated proxy signature scheme for mobile agent“. X Hong, K Chen. 2007. ieeexplore.ieee.org … , Information and Control, 2007. ICICIC’07 …2 cites.
  825. Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures“. B Carminati, E Ferrari. 2007. Springer Spatial Data on the Web2 cites.
  826. Security and integrity of data in cloud computing based on feature extraction of handwriting signature“. AA Yassin, HZ Neima, HS Hashim. 2014. researchgate.net International Journal of Cyber …2 cites.
  827. Security provenance model based on OPM.[D]“. T Liu, F Wang. 2013. en.cnki.com.cn Application Research of Computers2 cites.
  828. Shared RFID ownership transfer protocols“. N Li, Y Mu, W Susilo, V Varadharajan. 2015. Elsevier Computer Standards & Interfaces2 cites.
  829. Shedding Light on the Adoption of Let’s Encrypt“. A Manousis, R Ragsdale, B Draffin, A Agrawal…. 2016. arxiv.org arXiv preprint arXiv …2 cites.
  830. Shen, x.,” An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid,”“. H Li, R Lu, L Zhou, B Yang. 2014. Journal of System IEEE trans2 cites.
  831. Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection“. F Hou, H He, N Xiao, F Liu…. 2010. ieeexplore.ieee.org Computer and Information …2 cites.
  832. Storing UTXOs in a Balanced Merkle Tree (zero-trust nodes with O (1)-storage), Aug. 2012“. A Miller. 0. . 2 cites.
  833. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks“. J Dilley, A Poelstra, J Wilkins, M Piekarska…. 2016. arxiv.org arXiv preprint arXiv …2 cites.
  834. The OceanStore Write Path“. S Rhea, J Kubiatowicz. 2002. pdfs.semanticscholar.org 2 cites.
  835. Three architectures for trusted data dissemination in edge computing“. ST Goh, HH Pang, RH Deng, F Bao. 2006. Elsevier Data & Knowledge Engineering2 cites.
  836. Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes“. D Dachman-Soled, M Kulkarni, A Shahverdi. 2017. Springer … International Workshop on …2 cites.
  837. Time-stamping“. S Haber, H Massias. 2011. Springer Encyclopedia of Cryptography and Security2 cites.
  838. Time-Stamping: a survey“. K Wouters. 2004. Seminars on COmputer Security and Industrial …2 cites.
  839. Tiny SPU: Implementation and Analysis of Secure Program Update for Clustered Wireless Sensor Networks“. MB Nirmala, AS Majunath, BG Yogesh. 2012. Springer Global Trends in Computing and …2 cites.
  840. Tiny SPU: Implementation and Analysis of Secure Program Update for Clustered Wireless Sensor Networks“. MB Nirmala, AS Majunath, BG Yogesh. 2012. Springer Global Trends in Computing and …2 cites.
  841. Tools and services for long-term preservation of digital archives“. J JaJa, M Smorul, S Song. 2009. academia.edu … -US Workshop on International Trends in …2 cites.
  842. Trusted routing protocol based on cluster head for wireless sensor network“. Q Zhou, XD Zhou. 2008. en.cnki.com.cn Transducer and Microsystem Technologies2 cites.
  843. Use of the hash-based Merkle tree signature (MTS) algorithm in the cryptographic message syntax (CMS)“. R Housley. 2015. . 2 cites.
  844. Verifiable Credit Based Transfers in Wireless Ad Hoc Networks“. B Carbunar, B Lindsley, M Pearce…. 2007. ieeexplore.ieee.org … , 2007. IPDPS 2007 …2 cites.
  845. WSN Security“. J Lopez. 2009. sti.uniurb.it 9th International School on Foundations of Security …2 cites.
  846. Xcastor: Secure and scalable group communication in ad hoc networks“. M Schmittner, M Hollick. 2016. ieeexplore.ieee.org World of Wireless, Mobile and …2 cites.
  847. 基于体系结构扩展的云计算安全增强研究“. 刘宇涛, 夏虞斌, 陈海波. 2012. chinacloud.cn 集成技术2 cites.
  848. A bidirectional broadcasting authentication scheme for wireless sensor networks“. L Xu, M Wen, J Li. 2015. ieeexplore.ieee.org … and Internet Computing (CIC), 2015 IEEE …1 cites.
  849. A content authentication scheme in hybrid P2P network“. L Shi, Z Li. 2009. ieeexplore.ieee.org … Information Networking and Security, 2009. MINES’ …1 cites.
  850. A Method of User Revocation Using Authentication Tree of Group Signature“. Y CAI, Y LIU. 2010. en.cnki.com.cn Journal of Beijing University of Technology1 cites.
  851. A New Construction of Zero-Knowledge Sets Secure in Random Oracle Model“. R Xue, N Li, J Li. 2007. ieeexplore.ieee.org Data, Privacy, and E-Commerce, 2007 …1 cites.
  852. A New Digital Notary System“. K Blibech, A Gabillon. 2009. Springer Advanced Internet Based Systems and Applications1 cites.
  853. A new efficient protocol for authentication and certificate status management in personal area networks“. C Sur, JP Yang, KH Rhee. 2006. Springer Lecture Notes in Computer Science1 cites.
  854. A Survey on the Integrity Checking of Outsourced Data in Cloud Computing“. H Zhao, X Zheng. 2015. ieeexplore.ieee.org … Intelligence and Computing and 2015 IEEE …1 cites.
  855. A theory for lightweight cryptocurrency ledgers“. B White. 2015. . 1 cites.
  856. A Tree-Based µTESLA Broadcast Authentication for Sensor Networks“. DLP Ning, S Zhu, S Jajodia. 0. cse.psu.edu1 cites.
  857. A verification mechanism for cloud brokerage system“. JH Sianipar, C Meinel. 2015. ieeexplore.ieee.org Computer Science, Computer …1 cites.
  858. About т-Chain“. O ASOR. 0. bravenewcoin.com1 cites.
  859. Aggregate message authentication codes (AMACs) with on-the-fly verification“. YS Chen, CL Lei. 2013. Springer International journal of information security1 cites.
  860. An µTESLA Protocols with Multi-senders Based on a 2-Level XOR Chain with Data-Loss Tolerance“. D Yeo, HY Youm. 2010. ieeexplore.ieee.org Applications and the Internet (SAINT), 2010 …1 cites.
  861. An image authentication scheme considering privacy-A first step towards surveillance camera authentication“. N Kawaguchi, S Ueda, N Obata…. 2005. ieeexplore.ieee.org … , 2005. AINA 2005 …1 cites.
  862. An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability“. D Koo, Y Shin, J Yun, J Hur. 2017. ieeexplore.ieee.org Web Services (ICWS), 2017 IEEE …1 cites.
  863. An Online Query Authentication System for Outsourced Databases“. Y Zhou, C Wang. 2013. ieeexplore.ieee.org Trust, Security and Privacy in Computing and …1 cites.
  864. Analysis of a redactable signature scheme on data with dependencies“. D Bauer, DM Blough. 2009. smartech.gatech.edu 1 cites.
  865. Authentic Re-Publication by Untrusted Servers: A Novel Approach to Database Survivability“. P Devanbu, M Gertz, C Martel, P Rogaway…. 2000. researchgate.net … Workshop (ISW-2000 …1 cites.
  866. Authentic time-stamping for archival storage“. A Oprea. 2013. Google Patents US Patent 8,510,5661 cites.
  867. Authenticated dictionary based on frequency“. K Atighehchi, A Bonnecaze, T Muntean. 2014. Springer IFIP International Information …1 cites.
  868. Authentication and verification of digital data utilizing blockchain technology“. J Fisher, MH Sanchez. 2016. Google Patents US Patent App. 15/083,2381 cites.
  869. Authentication of Data on Devices“. A Kundu. 2012. ieeexplore.ieee.org Data Engineering Workshops (ICDEW), 2012 IEEE …1 cites.
  870. Authentication Techniques for UDDI Registries“. E Bertino, B Carminati, E Ferrari. 2007. igi-global.com Modern Technologies in Web …1 cites.
  871. Blockchains everywhere-a use-case of blockchains in the pharma supply-chain“. T Bocek, BB Rodrigues, T Strasser…. 2017. ieeexplore.ieee.org Integrated Network and …1 cites.
  872. Burn-in system for multicast data transmission“. D Dugoujon, L Rabret, G Babonneau. 2013. Google Patents US Patent 8,427,9941 cites.
  873. Challenges with End-to-End Email Encryption“. J Yu, V Cheval, M Ryan. 2014. w3.org 1 cites.
  874. Communicating Replicated State Machines“. D Wetterau. 2015. pdfs.semanticscholar.org 1 cites.
  875. Computer security by hardware-intrinsic authentication“. C Hoffman, M Cortes, DF Aranha, G Araujo. 2015. dl.acm.org Proceedings of the 10th …1 cites.
  876. Currency 3.0: Examining Digital Crypto Currency Markets“. JE Grushack. 2014. ai2-s2-pdfs.s3.amazonaws.com 1 cites.
  877. Data privacy and integrity appropriate for disk protection“. F Hou, D Gu, N Xiao, Y Tang. 2008. ieeexplore.ieee.org Computer and Information …1 cites.
  878. Device attacker models: fact and fiction“. J Yu, MD Ryan. 2015. Springer Cambridge International Workshop on Security …1 cites.
  879. Efficient and secure multicast authentication based on batch signatures using fractal merkle tree“. GC Vinoth. 2012. International Journal of Computer Science and …1 cites.
  880. Efficient and secure source authentication scheme for multicast user authentication“. Y Jeong, S Lee, S Shin. 2013. Springer Journal of Central South University1 cites.
  881. Efficient Content Authentication in Publish/Subscribe Systems“. W Wong, MF Magalhães. 2013. dca.fee.unicamp.br 1 cites.
  882. Efficient disk encryption and verification through trusted nonce“. F Hou, D Gu, N Xiao, Z Cai. 2008. ieeexplore.ieee.org Computers and Communications …1 cites.
  883. Efficient fine-grained data access control in wireless sensor networks“. Q Wang, K Ren, C Wang, W Lou. 2009. ieeexplore.ieee.org … Conference, 2009. MILCOM …1 cites.
  884. Efficient memory integrity verification schemes for secure processors“. W Ahmad. 2004. ece.uic.edu Proc of the 3rd IEEE International Conference on …1 cites.
  885. Efficient Multicast Authentication Batch Signature“. P Gayathri, A Jeyamadhi. 2014. pdfs.semanticscholar.org World Applied Science Journal1 cites.
  886. Efficient verifiable data streaming“. KS Kim, IR Jeong. 2015. Wiley Online Library Security and Communication Networks1 cites.
  887. Effiziente Reparatur von Repliken in Distributed Hash Tables“. M Lange. 2012. opus4.kobv.de 1 cites.
  888. Enhancing accountability and trust in distributed ledgers“. M Herlihy, M Moir. 2016. arxiv.org arXiv preprint arXiv:1606.074901 cites.
  889. Fast digital signature algorithm based on subgraph isomorphism“. L Szőllősi, T Marosits, G Fehér, A Recski. 2007. Springer Cryptology and Network …1 cites.
  890. Feasibility of rainbow signature for broadcast authentication in sensor networks“. P Singaravelu, S Verma. 2011. ieeexplore.ieee.org Vehicular Technology Conference …1 cites.
  891. Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree“. SH Kim, Y Kim, O Kwon, H Yoon. 2015. Springer International Workshop on Information …1 cites.
  892. Further analysis of a proposed hash-based signature standard“. S Fluhrer. 2017. eprint.iacr.org 1 cites.
  893. Generalized merkle trees and their applications“. ĽSM Stanek. 2007. sav.sk Tatra Mountains1 cites.
  894. Green secure processors: towards power-efficient secure processor design“. S Chhabra, Y Solihin. 2010. Springer Transactions on computational science X1 cites.
  895. Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital Signatures“. N Kumar, KPK Rao. 2014. pdfs.semanticscholar.org (IJCSIT) International Journal of …1 cites.
  896. Hash Tree Based Integrity Protection Appropriate for Disk“. F Hou, H He, N Xiao. 2009. ieeexplore.ieee.org Information Engineering, 2009. ICIE’09 …1 cites.
  897. Homomorphic Mini-blockchain Scheme“. BF Franca. 2015. cryptonite.info 1 cites.
  898. Implementation of Keccak hash function in Tree hashing mode on Nvidia GPU“. G Sevestre. 2012. sites.google.com 1 cites.
  899. Incremental hash tree for disk authentication“. F Hou, H He, N Xiao, F Liu…. 2010. ieeexplore.ieee.org … (ISCC), 2010 IEEE …1 cites.
  900. Integrity verification of pseudonymized documents“. S Haber, WG Horne, T Sander…. 2012. Google Patents US Patent 8,266,4391 cites.
  901. Introduction to Smart Grids“. H Li. 2014. Springer … Secure and Privacy Preserving Communications in …1 cites.
  902. Irminsule; a branch-consistent distributed library database“. T Gazagnaire, A Chaudhry, J Crowcroft…. 2014. ocaml.org OCaml 2014 …1 cites.
  903. Long-term public blockchain: Resilience against Compromise of Underlying Cryptography“. M Sato. 2017. ieeexplore.ieee.org Security and Privacy Workshops (EuroS&PW), 2017 …1 cites.
  904. Low-overhead authentication method for reprogramming protocol based on rateless codes in wireless sensor networks“. L Yang, S Li, Y Zhang, G Liu. 2014. ieeexplore.ieee.org Wireless Communications and …1 cites.
  905. Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter“. M Haifeng, Y Nianmin, C Shaobin…. 2014. journals.sagepub.com Journal of Algorithms …1 cites.
  906. Merkelized Abstract Syntax Trees“. J Rubin, M Naik, N Subramanian. 2014. raw.githubusercontent.com 1 cites.
  907. Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks [J]“. Y JIANG, H SHI. 2007. en.cnki.com.cn Chinese Journal of Sensors and Actuators1 cites.
  908. Method and apparatus for efficient certificate revocation“. CB Gentry, ZA Ramzan. 2012. Google Patents US Patent 8,321,6641 cites.
  909. Method and apparatus for efficient certificate revocation“. CB Gentry, ZA Ramzan. 2010. Google Patents US Patent 7,840,9941 cites.
  910. Method for securely broadcasting sensitive data in a wireless network“. OG Morchon, K Kursawe. 2010. Google Patents US Patent App. 13/384,0161 cites.
  911. MGT: A multi-grained memory hash mechanism for embedded processor“. Z Liu, Q Zhu, W Huo, X Zou…. 2012. ieeexplore.ieee.org Systems and Informatics …1 cites.
  912. Micropayment scheme based on merkle tree“. T Yunmeng, L Weimin…. 2004. EDITORIAL BOARD OF JOURNAL … JOURNAL …1 cites.
  913. Missive: Fast appliance launch from an untrusted buffer cache“. J Howell, J Elson, B Parno, JR Douceur. 2013. microsoft.com submission to USENIX ATC1 cites.
  914. M-map: Multi-factor memory authentication for secure embedded processors“. SK Haider, M Ahmad, F Hijaz, A Patni…. 2015. ieeexplore.ieee.org … Design (ICCD), 2015 …1 cites.
  915. Mobile agent based secure code update in wireless sensor networks“. MB Nirmala, AS Manjunath. 2015. ieeexplore.ieee.org Information Networking (ICOIN) …1 cites.
  916. Offline Authentication of Untrusted Storage“. D Clarke, B Gassend, GE Suh, M van Dijk, S Devadas. 2002. textfiles.com 1 cites.
  917. On Plausible Tree Hash Modes for SHA-3.“. K Atighehchi, A Bonnecaze. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …1 cites.
  918. Optimal trade-off for merkle tree traversal.“. M Karpinski, Y Nekrich. 2005. ICETE1 cites.
  919. Optimized Cryptonite System for Secure Data Storage on Cloud using Merkle Hash Tree“. A Almale, YB Gurav, SV Phulari. 0. academia.edu … Journal of Application or Innovation in …1 cites.
  920. Out-of-band validation of domain name system records“. W Manning. 2015. Google Patents US Patent App. 14/983,0931 cites.
  921. Parallel implementations of MD6, a modern cryptographic hash function“. A Bienner, B Dequidt. 2009. moais.imag.fr 1 cites.
  922. PEAN: A Public Key Authentication Scheme in Wireless Sensor and Actor Network“. J Ma, S Zhang, Y Zhong, Y Wu. 2006. ieeexplore.ieee.org … , 2006. CIT’06. The Sixth IEEE …1 cites.
  923. PoisonIvy: Safe speculation for secure memory“. TS Lehman, AD Hilton, BC Lee. 2016. ieeexplore.ieee.org … (MICRO), 2016 49th Annual …1 cites.
  924. Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …1 cites.
  925. Proofs of Ownership in Remote Storage Systems“. B Pinkas. 0. pdfs.semanticscholar.org1 cites.
  926. Providing File Services using a Distributed Hash Table“. L Seipel, A Schuette. 2015. researchgate.net … (04) INTERACTIVE S< STEMS: Problems of …1 cites.
  927. PsFS: A high-throughput parallel file system for secure Cloud Storage system“. H Du, Z Li. 2012. ieeexplore.ieee.org Measurement, Information and Control (MIC), 2012 …1 cites.
  928. Public data auditing with constrained auditing number for cloud storage“. G Yang, H Xia, XXJ WentingShen…. 2015. researchgate.net Journal of security and its …1 cites.
  929. Public key authentication with memory tokens“. C Vuillaume, K Okeya, E Dahmen…. 2008. Springer International Workshop on …1 cites.
  930. Public key authentication with memory tokens“. C Vuillaume, K Okeya, E Dahmen…. 2008. Springer International Workshop on …1 cites.
  931. Reassessing Grover’s Algorithm“. S Fluhrer. 0. eprint.iacr.org1 cites.
  932. Remote OH-group directing effect in the stereochemistry of intramolecular alkoxide addition to conjugated double bond“. I Tömösközi, G Galambos, G Kovács, L Gruber. 1979. Elsevier Tetrahedron Letters1 cites.
  933. Resistant TIK-Based endairA Against the Tunneling Attack“. M Fanaei, M Berenjkoub…. 2008. ieeexplore.ieee.org … Technology, 2008. ICACT …1 cites.
  934. RSA shortcuts“. A Shamir. 2003. dl.acm.org Proceedings of the 2003 RSA conference on The …1 cites.
  935. SAMcast-A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks.“. W Ahmad, AA Khokhar. 2007. pdfs.semanticscholar.org ICC1 cites.
  936. Secure data outsourcing“. B Carminati. 2009. Springer Encyclopedia of Database Systems1 cites.
  937. Secure Publishing Techniques“. E Bertino, LD Martino, F Paci…. 2009. Springer Security for Web Services …1 cites.
  938. Secured data integrity routing for Wireless Sensor Networks“. C Kavitha. 2014. ieeexplore.ieee.org Advances in Electronics, Computers and …1 cites.
  939. Securing Content in Peer-to-Peer File Systems“. D Bansal. 2003. researchgate.net E&CE1 cites.
  940. Security and quality of service (QoS) co-design in vehicular ad hoc networks with cooperative communications“. FR Yu, A Boukerche. 2011. dl.acm.org Proceedings of the first ACM international …1 cites.
  941. Security Approaches for Information-Centric Networking“. W Wong, MF Magalhães. 2012. intechopen.com Applied Cryptography and Network …1 cites.
  942. Security in peer-to-peer networks“. QH Vu, M Lupu, BC Ooi. 2010. Springer Peer-to-peer Computing1 cites.
  943. Security memory system for mobile device or computer against memory attacks“. G Liu, X Zhang, D Wang, Z Liu, H Wang. 2013. Springer International Conference on …1 cites.
  944. SelectAudit: A secure and efficient audit framework for networked virtual environments“. T Phan, DD Yao. 2008. Springer International Conference on Collaborative Computing …1 cites.
  945. Set Reconciliation in Two Rounds of Communication“. R Gabrys, A Coker. 2014. dtic.mil 1 cites.
  946. SFMD: A secure data forwarding and malicious routers detecting protocol“. X Yang, H Hu, X Chen. 2008. ieeexplore.ieee.org … Reliability and Security, 2008. ARES 08 …1 cites.
  947. Source Authentication Protocol for IP-TV“. K Shin, HK Choi. 2008. pdfs.semanticscholar.org ITC-CSCC: International Technical …1 cites.
  948. Sparse Merkle Trees: Definitions and Space-Time Trade-Offs With Applications for Balloon“. R Östersjö. 2016. diva-portal.org 1 cites.
  949. Stampery Blockchain Timestamping Architecture (BTA)“. AS de Pedro Crespo, LIC García. 2016. researchgate.net 1 cites.
  950. The Adaptive Multicast Data Origin Authentication Protocol.“. L Zhu, H Yang, Z Yang. 2013. books.google.com ICoC1 cites.
  951. Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach“. JC Corena, T Ohtsuki. 2012. ieeexplore.ieee.org Global Communications Conference …1 cites.
  952. Timed Encryption and Its Application.“. S Jiang. 2010. eprint.iacr.org IACR Cryptology ePrint Archive1 cites.
  953. Traceability signature system, signature method and program product“. M Numao, Y Watanabe, T Yoshizawa…. 2008. Google Patents US Patent …1 cites.
  954. Trusted sampling-based result verification on mass data processing“. Y Ding, H Wang, P Shi, H Fu, C Guo…. 2013. ieeexplore.ieee.org … (SOSE), 2013 IEEE …1 cites.
  955. Using Batch Hashing for Signing and Time-Stamping“. M Freudenthal. 2013. cyber.ee 1 cites.
  956. Using counter cache coherence to improve memory encryptions performance in multiprocessor systems“. Z Yuanyuan, G Junzhong. 2011. Springer … and Trust Computing, Data Management and …1 cites.
  957. Using merkle tree to mitigate cooperative black-hole attack in Wireless Mesh Networks“. S Om, M Talib. 2011. ithuteng.ub.bw 1 cites.
  958. Verifiable multi-server private information retrieval“. LF Zhang, R Safavi-Naini. 2014. Springer … on Applied Cryptography and Network Security1 cites.
  959. Verification of Web-Content Searching Through Authenticated Web Crawler“. D Nguyen. 0. pdfs.semanticscholar.org1 cites.
  960. Verify memory integrity basing on hash tree and MAC combined approach“. F Hou, Z Wang, Y Tang, J Liu. 2004. Springer Lecture notes in computer science1 cites.
  961. Verifying Outsourced Inner Product Computation via Vector Aggregation in Cloud Computing“. Q Zhanga, Q Lub. 2014. Journal of Computational Information Systems1 cites.
  962. Vizualizace a vyhledávání v distribuované databázi“. M Křeček. 2017. dspace.cvut.cz 1 cites.
  963. Vizualizace a vyhledávání v distribuované databázi“. Š Steklík. 2017. dspace.cvut.cz 1 cites.
  964. ZFS.“. J Bonwick, B Moore. 2007. snia.org LISA1 cites.
  965. ZFS-Para usuários OpenSolaris, Windows, Mac e Linux“. M LEAL. 0. books.google.com1 cites.
  966. Zukunftssichere digitale Signaturen–FutureSign“. J Buchmann, E Dahmen. 2008. horst-goertz.de … , German IT Security Award (Deutscher IT …1 cites.
  967. 클라우드 데이터 무결성 검증 방법 조사“. 권오민, 윤현수. 2013. dev02.dbpia.co.kr 한국정보과학회 학술발표논문집1 cites.
  968. 08.01-01В. 183. Древовидная цифровая подпись Merkle и высоконадёжная вычислительная платформа. Merkle tree digital signature and trusted …“. ВН Ушаков. 2008. elibrary.ru Автоматика и вычислительная техника0 cites.
  969. A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments“. M Kim, WK Choi, MS Jun. 2016. ingentaconnect.com Advanced Science Letters0 cites.
  970. A practical space and time efficient algorithm for Merkle tree traversal“. M Knecht. 2014. academia.edu 0 cites.
  971. A Secure Deduplication System at Client Side in Cloud Computing“. PA Mulik, V Reddy. 0. ijrter.com0 cites.
  972. An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI“. F Coelho. 2007. cri.ensmp.fr 0 cites.
  973. Content Based Scheduling of Virtual Machines Using Merkle Tree“. R Jangir, S Bajaj, CM Sharma, A Pandey. 0. pdfs.semanticscholar.org0 cites.
  974. Content Based Scheduling of Virtual Machines Using Merkle Tree“. R Jangir, S Bajaj, CM Sharma, A Pandey. 0. pdfs.semanticscholar.org0 cites.
  975. Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol“. J Macheta, S Noether, S Noether, J Smooth. 2014. lab.getmonero.org 0 cites.
  976. Distributed Bonsai Merkle Tree“. O Shwartz, Y Birk. 2017. vee.faculty-ms.technion.ac.il 0 cites.
  977. Email Stamping: Gmelius Blockchain Architecture“. DRF BERSIER, R BISCHOF. 0. gmelius.com0 cites.
  978. File Integrity Check on Mobile Platform Based on Merkle Tree“. XY ZHANG, BB FAN. 2010. en.cnki.com.cn Computer Systems & Applications0 cites.
  979. Generalized Merkle Tree Representation for Actuarial Applications“. C Barracchini, ME Adessi. 2009. ricerca.univaq.it ECONOMIA, IMPRESA E MERCATI …0 cites.
  980. Hierarchy Merkle tree wireless sensor network architecture“. P Cong, Z Ning, F Xue, K Xu…. 2017. inderscienceonline.com International Journal of …0 cites.
  981. Merkle tree digital signature and trusted computing platform“. W Xiaofei, H Fan, T Xueming, C Guohua. 2006. Springer Wuhan University Journal of …0 cites.
  982. Merkle Tree Digital Signature and Trusted Computing Platform“. WXHFT Xueming, CUI Guohua. 0. 万方数据资源系统0 cites.
  983. Merkle Tree Traversal in Log Space and Time (2003 Preprint version)“. M Szydlo. 0. szydlo.com0 cites.
  984. Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석“. 이정엽, 박창섭. 2017. earticle.net 융합보안논문지0 cites.
  985. Multicast Source Authentication Based on Hash Chain and Merkle Tree“. Z Hong①, J Xing-hao①, YAO Yi-feng②…. 2007. en.cnki.com.cn Communications …0 cites.
  986. New Techniques for Streaming Authenticated Data Structures“. CM Yu, SY Huang, Y Huang. 2015. lbd.dcc.ufmg.br … and Networks, Rio De Janeiro, Brazil …0 cites.
  987. Optimal Trade-O for Merkle Tree Traversal“. P Berman, M Karpinski, Y Nekrich. 0. . 0 cites.
  988. Ordered Merkle Tree-a versatile data-structure for security kernels“. SD Mohanty. 2013. search.proquest.com 0 cites.
  989. Research of digital credentials selective disclosure“. C YANG, T CAO, Y ZHANG. 2006. en.cnki.com.cn Computer Engineering and Design0 cites.
  990. Research of traverse and application of Merkle authentication-tree“. F Liu, Y Cai, C Wang. 2012. … Technology Institute, No. 26, PO Box … Jisuanji …0 cites.
  991. Research on the integrity of data provenance based on Merkle tree“. T LIU, F WANG. 2012. en.cnki.com.cn Journal of Shandong University of Technology …0 cites.
  992. Secure Outsourcing of Big Key-Value Storage with Freshness Authenticity“. Y Tang, T Wang, X Hu, R Sailer, P Pietzuch, L Liu. 0. . 0 cites.
  993. Torrent File Optimization Strategy Based on Merkle Tree in Bittorrent System“. C LIANG, J LI, D HUANG, J LI, X GAO. 2008. en.cnki.com.cn Computer Engineering0 cites.
  994. User Verifiable Multiple Keyword Search Scheme using the Merkle Tree for Outsourced Data in the Cloud“. D Thiyagarajan, R Ganesan. 2017. ijtech.eng.ui.ac.id INTERNATIONAL JOURNAL OF …0 cites.
  995. Using a Sparse Merkle Tree in Balloon“. T Pulls. 0. cs.kau.se0 cites.
  996. 해시 기반 서명 기법 최신 기술 동향 및 전망“. 박태환, 배봉진, 김호원. 2016. Journal of The Korea Institute of Information Security & …0 cites.
  997. 一种基于 Merkle-Tree 的云存储数据持有性检查方案“. 孟浩华, 曹波, 袁慧, 董亮. 2017. cqvip.com 计算机与数字工程0 cites.
  998. 透過算術 Merkle Tree 的驗證資料結構“. 吳欣明. 2016. yzuir.yzu.edu.tw 0 cites.

———————————————————-

(Featured Image: ‘Scifi City by Telmand)