Title | ||
---|---|---|
Dynamic authenticated data structures with access control for outsourcing data stream. |
Abstract | ||
---|---|---|
Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided by the third party is trust. Therefore, in order to efficiently and effectively verify the trusted o... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1049/iet-ifs.2015.0243 | IET Information Security |
Keywords | Field | DocType |
authorisation,data structures | Data structure,Authenticated data structures,Data stream mining,Computer science,Data stream,Computer network,Outsourcing,Third party,Access control,Database,Authentication scheme | Journal |
Volume | Issue | ISSN |
11 | 5 | 1751-8709 |
Citations | PageRank | References |
1 | 0.35 | 9 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yi Sun | 1 | 2 | 1.72 |
Xingyuan Chen | 2 | 2 | 0.70 |
Xuehui Du | 3 | 11 | 8.37 |
Jian Xu | 4 | 224 | 55.55 |