×

Found 129 Documents (Results 1–100)

Data structures in JDSL. 2nd edition. (English) Zbl 1387.68090

Mehta, Dinesh P. (ed.) et al., Handbook of data structures and applications. Boca Raton, FL: Chapman & Hall/CRC (ISBN 978-1-4987-0185-3/hbk; 978-1-4987-0188-4/ebook). Chapman & Hall/CRC Computer and Information Science Series, 679-695 (2018).
MSC:  68P05 68N15
PDFBibTeX XMLCite

Accountable storage. (English) Zbl 1521.68049

Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 623-644 (2017).
MSC:  68P20 68P27 94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge accumulators and set algebra. (English) Zbl 1407.94110

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 67-100 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable zero-knowledge order queries and updates for fully dynamic lists and trees. (English) Zbl 1416.94051

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 216-236 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge authenticated order queries and order statistics on a list. (English) Zbl 1459.68043

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 149-171 (2015).
MSC:  68P05 68P27 94A60
PDFBibTeX XMLCite
Full Text: DOI

The Melbourne shuffle: improving oblivious storage in the cloud. (English) Zbl 1409.68086

Esparza, Javier (ed.) et al., Automata, languages, and programming. 41st international colloquium, ICALP 2014, Copenhagen, Denmark, July 8–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8573, 556-567 (2014).
MSC:  68P20 68W20
PDFBibTeX XMLCite
Full Text: DOI arXiv

Streaming authenticated data structures. (English) Zbl 1306.94106

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 353-370 (2013).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Graph drawing in the cloud: privately visualizing relational data using small working storage. (English) Zbl 1377.68177

Didimo, Walter (ed.) et al., Graph drawing. 20th international symposium, GD 2012, Redmond, WA, USA, September 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36762-5/pbk). Lecture Notes in Computer Science 7704, 43-54 (2013).
MSC:  68R10 05C85 68W40
PDFBibTeX XMLCite
Full Text: DOI Link

Signatures of correct computation. (English) Zbl 1315.94098

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 222-242 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Privacy-preserving group data access via stateless oblivious RAM simulation. (English) Zbl 1421.68040

Rabani, Yuval (ed.), Proceedings of the 23rd annual ACM-SIAM symposium on discrete algorithms, SODA 2012, Kyoto, Japan, January 17–19, 2012. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 157-167 (2012).
MSC:  68P25 68Q10
PDFBibTeX XMLCite
Full Text: Link

Optimal verification of operations on dynamic sets. (English) Zbl 1287.94094

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 91-110 (2011).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Optimal authenticated data structures with multilinear forms. (English) Zbl 1290.94154

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 246-264 (2010).
MSC:  94A62 68P25 68P05
PDFBibTeX XMLCite
Full Text: DOI

Reliable resource searching in P2P networks. (English) Zbl 1184.68114

Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 437-447 (2009).
MSC:  68M15 68M10
PDFBibTeX XMLCite
Full Text: DOI

Super-efficient verification of dynamic outsourced databases. (English) Zbl 1153.68368

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 407-424 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Time and space efficient algorithms for two-party authenticated data structures. (English) Zbl 1285.94110

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 1-15 (2008).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient content authentication in peer-to-peer networks. (English) Zbl 1214.68085

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 354-372 (2007).
MSC:  68M14 94A62
PDFBibTeX XMLCite
Full Text: DOI

Graph algorithms and applications 5. Reprinted from the Journal of Graph Algorithms and Applications 8, No. 1-2 (2004). (English) Zbl 1136.68300

Hackensack, NJ: World Scientific (ISBN 981-256-845-X/pbk; 978-981-277-328-9/ebook). xi, 366 p. (2006).
MSC:  68-01 68W05 68R10
PDFBibTeX XMLCite
Full Text: DOI

Indexing information for data forensics. (English) Zbl 1126.68395

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 206-221 (2005).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational bounds on hierarchical data processing with applications to information security. (English) Zbl 1082.68573

Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11–15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 153-165 (2005).
MSC:  68P25 68Q17 68P05
PDFBibTeX XMLCite
Full Text: DOI

Secure biometric authentication for weak computational devices. (English) Zbl 1120.94305

Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 357-371 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Proceedings of the seventh workshop on algorithm engineering and experiments and the second workshop on analytic algorithmics and combinatorics (ALENEX/ANALCO), Vancouver, BC, Canada, January 22, 2005. (English) Zbl 1083.68641

Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 0-89871-596-2). ix, 273 p. (2005).
MSC:  68W05 68-06 00B25
PDFBibTeX XMLCite

Efficient tree-based revocation in groups of low-state devices. (English) Zbl 1104.94021

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 511-527 (2004).
MSC:  94A60 94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Graph algorithms and applications 3. Repr. from Journal of Graph Algorithms and Applications 6 (2001). (English) Zbl 1069.68571

River Edge, NJ: World Scientific (ISBN 981-238-939-3/pbk; 978-981-279-660-8/ebook). x, 404 p. (2004).
PDFBibTeX XMLCite
Full Text: DOI

Graph algorithms and applications II. Repr. from Journal of Graph Algorithms and Applications 4–5 (2000-2001). (English) Zbl 1069.68570

River Edge, NJ: World Scientific (ISBN 981-238-855-9/pbk; 978-981-279-474-1/ebook). xi, 521 p. (2004).
PDFBibTeX XMLCite
Full Text: DOI

Authenticated dictionaries for fresh attribute credentials. (English) Zbl 1051.68665

Nixon, Paddy (ed.) et al., Trust management. First international conference, iTrust 2003, Heraklion, Crete, Greece, May 28–30, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40224-1/pbk). Lect. Notes Comput. Sci. 2692, 332-347 (2003).
PDFBibTeX XMLCite
Full Text: Link

Authenticated data structures for graph and geometric searching. (English) Zbl 1039.94524

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 295-313 (2003).
MSC:  94A62 94A60 05C90
PDFBibTeX XMLCite
Full Text: Link

An efficient dynamic and distributed cryptographic accumulator. (English) Zbl 1019.68553

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 372-388 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Graph algorithms and applications I. Repr. from Journal of Graph Algorithms and Applications 1-3 (1997-1999). Repr. from Journal of Graph Algorithms and Applications 1-3 (1997-1999). (English) Zbl 1004.68120

Singapore: World Scientific. x, 427 p. £58.00 (2002).
PDFBibTeX XMLCite
Full Text: DOI

Fast layout methods for timetable graphs. (English) Zbl 1043.68607

Marks, Joe (ed.), Graph drawing. 8th international symposium, GD 2000, Colonial Williamsburg, VA, USA, September 20–23, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41554-8). Lect. Notes Comput. Sci. 1984, 127-138 (2001).
PDFBibTeX XMLCite
Full Text: Link

A user study in similarity measures for graph drawing. (English) Zbl 1043.68608

Marks, Joe (ed.), Graph drawing. 8th international symposium, GD 2000, Colonial Williamsburg, VA, USA, September 20–23, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41554-8). Lect. Notes Comput. Sci. 1984, 19-30 (2001).
MSC:  68R10 68U05
PDFBibTeX XMLCite
Full Text: Link

Persistent authenticated dictionaries and their applications. (English) Zbl 1042.68551

Davida, George I. (ed.) et al., Information security. 4th international conference, ISC 2001, Malaga, Spain, October 1–3, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42662-0). Lect. Notes Comput. Sci. 2200, 379-393 (2001).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

Simplified analyses of randomized algorithms for searching, sorting, and selection. (English) Zbl 1048.68031

Rajasekaran, Sanguthevar (ed.) et al., Handbook of randomized computing. Vols. 1, 2. Dordrecht: Kluwer Academic Publishers (ISBN 0-7923-6959-9 (set); 0-7923-6957-2 (v. 1); 0-7923-6958-0 (v. 2)). Comb. Optim. 9, 23-34 (2001).
MSC:  68P10 68P05
PDFBibTeX XMLCite

Algorithms and data structures. 7th international workshop, WADS 2001, Providence, RI, USA, August 8–10, 2001. Proceedings. (English) Zbl 0969.00079

Lecture Notes in Computer Science. 2125. Berlin: Springer. xii, 484 p. (2001).
MSC:  00B25 68-06
PDFBibTeX XMLCite

Algorithms and data structures. 6th international workshop, WADS’99, Vancouver, Canada, August 11–14, 1999. Proceedings. (English) Zbl 1061.68501

Lecture Notes in Computer Science 1663. Berlin: Springer (ISBN 3-540-66279-0/pbk). ix, 368 p. (1999).
PDFBibTeX XMLCite

Turn-regularity and planar orthogonal drawings. (Extended abstract). (English) Zbl 0948.68522

Kratochvil, Jan (ed.), Graph drawing. 7th international symposium, GD ’99, Štiřín Castle, Czech Republic, September 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1731, 8-26 (1999).
MSC:  68R10 68U05 68Q25
PDFBibTeX XMLCite

Checking the convexity of polytopes and the planarity of subdivisions (extended abstract). (English) Zbl 1497.68524

Dehne, Frank (ed.) et al., Algorithms and data structures. 5th international workshop, WADS ’97, Halifax, Nova Scotia, Canada, August 6–8, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1272, 186-199 (1997).
MSC:  68U05
PDFBibTeX XMLCite
Full Text: DOI

Algorithms and data structures. 5th international workshop, WADS ’97, Halifax, Nova Scotia, Canada, August 6–8, 1997. Proceedings. (English) Zbl 1492.68014

Lecture Notes in Computer Science 1272. Berlin: Springer (ISBN 978-3-540-63307-5/pbk; 978-3-540-69422-9/ebook). xi, 476 p. (1997).
PDFBibTeX XMLCite
Full Text: DOI

Output-sensitive reporting of disjoint paths (extended abstract). (English) Zbl 07796023

Cai, Jin-Yi (ed.) et al., Computing and combinatorics. Second annual international conference, COCOON ’96, Hong Kong, June 17–19, 1996. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1090, 81-91 (1996).
PDFBibTeX XMLCite
Full Text: DOI

External-memory graph algorithms. (English) Zbl 0849.68089

Clarkson, K. (ed.), Proceedings of the 6th annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, USA, January 22-24, 1995. Philadelphia, PA: SIAM. 139-149 (1995).
MSC:  68R10 68Q25
PDFBibTeX XMLCite

On-line convex planarity testing (extended abstract). (English) Zbl 1528.68286

Mayr, Ernst W. (ed.) et al., Graph-theoretic concepts in computer science. 20th international workshop. WG ’94, Herrsching, Germany, June 16–18, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 903, 242-255 (1995).
PDFBibTeX XMLCite
Full Text: DOI

Graph drawing. DIMACS international workshop, GD ’94, Princeton, NJ, USA, October 10–12, 1994. Proceedings. (English) Zbl 0806.68007

Lecture Notes in Computer Science 894. Berlin: Springer-Verlag (ISBN 3-540-58950-3/pbk). x, 471 p. (1994).
MSC:  68-06 68R10 00B25
PDFBibTeX XMLCite
Full Text: DOI

Reinventing the wheel, an optimal data structure for connectivity queries. (English) Zbl 1310.68065

Proceedings of the 25th annual ACM symposium on theory of computing, STOC ’93. San Diego, CA, USA, May 16–18, 1993. New York, NY: Association for Computing Machinery (ACM) (ISBN 0-89791-591-7). 194-200 (1993).
MSC:  68P05 68R10
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software