Most Cited Merkle Tree Publications

Tree IllustrationMerkle Trees are data structures  used by blockchain technologies. They store hashes of data. It is particularly useful for decentralized network applications as a way to verify data is correct across different nodes or servers. Merkle trees is a cryptographic technique invented by Ralph Merkle. His personal website is Last updated November 19th, 2017.

  1. Dynamo: amazon’s highly available key-value store“. G DeCandia, D Hastorun, M Jampani…. 2007. ACM SIGOPS operating …. 4088 cites.
  2. Random key predistribution schemes for sensor networks“. H Chan, A Perrig, D Song. 2003. Security and Privacy, 2003 …. 3698 cites.
  3. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks“. YC Hu, DB Johnson, A Perrig. 2003. Elsevier Ad hoc networks. 1864 cites.
  4. Dynamic provable data possession“. CC Erway, A Küpçü, C Papamanthou…. 2015. ACM Transactions on …. 1020 cites.
  5. Privacy-preserving public auditing for secure cloud storage“. C Wang, SSM Chow, Q Wang, K Ren…. 2013. IEEE transactions on …. 942 cites.
  6. Plutus: Scalable Secure File Sharing on Untrusted Storage.“. M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu. 2003. Fast. 881 cites.
  7. A survey of security issues in wireless sensor networks“. Y Wang, G Attebury, B Ramamurthy. 2006. . 832 cites.
  8. Non-interactive verifiable computing: Outsourcing computation to untrusted workers“. R Gennaro, C Gentry, B Parno. 2010. Springer Advances in Cryptology–CRYPTO 2010. 737 cites.
  9. SECTOR: secure tracking of node encounters in multi-hop wireless networks“. S Čapkun, L Buttyán, JP Hubaux. 2003. … of the 1st ACM workshop on Security …. 503 cites.
  10. Authentication and integrity in outsourced databases“. E Mykletun, M Narasimha, G Tsudik. 2006. ACM Transactions on Storage …. 457 cites.
  11. Proofs of ownership in remote storage systems“. S Halevi, D Harnik, B Pinkas…. 2011. Proceedings of the 18th …. 456 cites.
  12. Homomorphic signature schemes“. R Johnson, D Molnar, D Song, D Wagner. 2002. Springer CT-RSA. 392 cites.
  13. On certificate revocation and validation“. PC Kocher. 1998. Springer International Conference on Financial Cryptography. 348 cites.
  14. Dynamic authenticated index structures for outsourced databases“. F Li, M Hadjieleftheriou, G Kollios…. 2006. Proceedings of the 2006 …. 344 cites.
  15. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization“. F Zhang, J Chen, H Chen, B Zang. 2011. Proceedings of the Twenty-Third …. 341 cites.
  16. Efficient Replica Maintenance for Distributed Storage Systems.“. BG Chun, F Dabek, A Haeberlen, E Sit…. 2006. NSDI. 297 cites.
  17. Authentic third-party data publication“. P Devanbu, M Gertz, C Martel…. 2002. Springer Data and Application …. 279 cites.
  18. An efficient scheme for authenticating public keys in sensor networks“. W Du, R Wang, P Ning. 2005. Proceedings of the 6th ACM international …. 263 cites.
  19. Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks“. H Zhu, X Lin, R Lu, Y Fan…. 2009. IEEE Transactions on …. 263 cites.
  20. Verifying completeness of relational query results in data publishing“. HH Pang, A Jain, K Ramamritham, KL Tan. 2005. Proceedings of the 2005 …. 263 cites.
  21. Caches and hash trees for efficient memory integrity verification“. B Gassend, GE Suh, D Clarke…. 2003. … , 2003. HPCA-9 …. 262 cites.
  22. Tahoe: the least-authority filesystem“. Z Wilcox-O’Hearn, B Warner. 2008. Proceedings of the 4th ACM international …. 244 cites.
  23. Herding hash functions and the Nostradamus attack“. J Kelsey, T Kohno. 2006. Springer Annual International Conference on the Theory and …. 239 cites.
  24. Integrity auditing of outsourced data“. M Xie, H Wang, J Yin, X Meng. 2007. … of the 33rd international conference on …. 238 cites.
  25. Zerocash: Decentralized anonymous payments from bitcoin“. EB Sasson, A Chiesa, C Garman…. 2014. Security and Privacy …. 236 cites.
  26. Accountable-subgroup multisignatures“. S Micali, K Ohta, L Reyzin. 2001. Proceedings of the 8th ACM conference on …. 232 cites.
  27. Steganalysis of least significant bit matching using multi‐order differences“. Z Xia, X Wang, X Sun, B Wang. 2014. Wiley Online Library Security and Communication …. 230 cites.
  28. Securing the deluge network programming system“. PK Dutta, JW Hui, DC Chu…. 2006. Information Processing in …. 227 cites.
  29. Securely outsourcing linear algebra computations“. MJ Atallah, KB Frikken. 2010. Proceedings of the 5th ACM Symposium on …. 222 cites.
  30. On the distribution and revocation of cryptographic keys in sensor networks“. H Chan, VD Gligor, A Perrig…. 2005. IEEE Transactions on …. 220 cites.
  31. Efficient Security Mechanisms for Routing Protocolsa.“. YC Hu, A Perrig, DB Johnson. 2003. NDSS. 214 cites.
  32. Wormhole detection in wireless ad hoc networks“. YC Hu, A Perrig, DB Johnson. 2002. … of Computer Science …. 210 cites.
  33. Micropayments revisited“. S Micali, RL Rivest. 2002. Springer CT-RSA. 207 cites.
  34. A general model for authenticated data structures“. C Martel, G Nuckolls, P Devanbu, M Gertz, A Kwong…. 2004. Springer Algorithmica. 201 cites.
  35. An ideal-security protocol for order-preserving encoding“. RA Popa, FH Li, N Zeldovich. 2013. Security and Privacy (SP), 2013 …. 201 cites.
  36. Practical broadcast authentication in sensor networks“. D Liu, P Ning, S Zhu, S Jajodia. 2005. Mobile and Ubiquitous …. 194 cites.
  37. Authenticating query results in edge computing“. HH Pang, KL Tan. 2004. Data Engineering, 2004. Proceedings. 20th …. 193 cites.
  38. Multi-user broadcast authentication in wireless sensor networks“. K Ren, S Yu, W Lou, Y Zhang. 2009. IEEE Transactions on Vehicular …. 191 cites.
  39. Boosting efficiency and security in proof of ownership for deduplication“. R Di Pietro, A Sorniotti. 2012. Proceedings of the 7th ACM Symposium on …. 177 cites.
  40. Mobility helps peer-to-peer security“. S Capkun, JP Hubaux, L Buttyan. 2006. IEEE Transactions on …. 176 cites.
  41. Selective and authentic third-party distribution of XML documents“. E Bertino, B Carminati, E Ferrari…. 2004. … on Knowledge and …. 173 cites.
  42. Efficient generic forward-secure signatures with an unbounded number of time periods“. T Malkin, D Micciancio, S Miner. 2002. Springer Eurocrypt. 170 cites.
  43. HIDE: an infrastructure for efficiently protecting information leakage on the address bus“. X Zhuang, T Zhang, S Pande. 2004. ACM SIGPLAN Notices. 169 cites.
  44. Flexible authentication of XML documents“. P Devanbu, M Gertz, A Kwong, C Martel…. 2004. Journal of …. 167 cites.
  45. Authentic data publication over the Internet1“. P Devanbu, M Gertz, C Martel…. 2003. Journal of Computer …. 160 cites.
  46. Fast, Inexpensive Content-Addressed Storage in Foundation.“. SC Rhea, R Cox, A Pesterev. 2008. USENIX Annual Technical Conference. 154 cites.
  47. On broadcast authentication in wireless sensor networks“. K Ren, W Lou, K Zeng, PJ Moran. 2007. IEEE Transactions on …. 154 cites.
  48. Uncheatable grid computing“. W Du, M Murugesan, J Jia. 2010. Algorithms and theory of computation …. 153 cites.
  49. Improving cost, performance, and security of memory encryption and authentication“. C Yan, D Englender, M Prvulovic, B Rogers…. 2006. ACM SIGARCH …. 152 cites.
  50. The pollution attack in P2P live video streaming: measurement results and defenses“. P Dhungel, X Hei, KW Ross, N Saxena. 2007. … of the 2007 workshop on Peer …. 152 cites.
  51. Private data deduplication protocols in cloud storage“. WK Ng, Y Wen, H Zhu. 2012. Proceedings of the 27th Annual ACM …. 151 cites.
  52. Probabilistically bounded staleness for practical partial quorums“. P Bailis, S Venkataraman, MJ Franklin…. 2012. Proceedings of the …. 150 cites.
  53. Zero-knowledge sets“. S Micali, M Rabin, J Kilian. 2003. Foundations of Computer Science …. 150 cites.
  54. Asymptotically efficient lattice-based digital signatures“. V Lyubashevsky, D Micciancio. 2008. Springer Theory of Cryptography. 147 cites.
  55. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts“. A Kosba, A Miller, E Shi, Z Wen…. 2016. Security and Privacy …. 147 cites.
  56. Private and cheating-free outsourcing of algebraic computations“. D Benjamin, MJ Atallah. 2008. … , Security and Trust, 2008. PST’08 …. 144 cites.
  57. Certificate transparency“. B Laurie, A Langley, E Kasper. 2013. . 136 cites.
  58. Iris: A scalable cloud file system with efficient integrity checks“. E Stefanov, M van Dijk, A Juels, A Oprea. 2012. Proceedings of the 28th …. 136 cites.
  59. Informed content delivery across adaptive overlay networks“. JW Byers, J Considine, M Mitzenmacher…. 2004. IEEE/ACM Transactions …. 135 cites.
  60. Electronic lottery tickets as micropayments“. RL Rivest. 1997. Springer International Conference on Financial Cryptography. 129 cites.
  61. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.“. N Santos, R Rodrigues, KP Gummadi…. 2012. USENIX security …. 129 cites.
  62. Scalable architectural support for trusted software“. D Champagne, RB Lee. 2010. High Performance Computer …. 127 cites.
  63. Merkle tree traversal in log space and time“. M Szydlo. 2004. Springer Eurocrypt. 124 cites.
  64. Tamper detection in audit logs“. RT Snodgrass, SS Yao, C Collberg. 2004. … on Very large data bases-Volume …. 122 cites.
  65. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS“. LFG Sarmenta, M Van Dijk, CW O’Donnell…. 2006. Proceedings of the first …. 122 cites.
  66. Distillation codes and applications to DoS resistant multicast authentication“. C Karlof, N Sastry, Y Li, A Perrig, JD Tygar. 2004. NDSS. 121 cites.
  67. Recursive composition and bootstrapping for SNARKs and proof-carrying data“. N Bitansky, R Canetti, A Chiesa, E Tromer. 2013. … of the forty-fifth annual ACM …. 120 cites.
  68. Memory Delegation.“. KM Chung, YT Kalai, FH Liu, R Raz. 2011. Springer CRYPTO. 117 cites.
  69. New approaches to security and availability for cloud data“. A Juels, A Oprea. 2013. Communications of the ACM. 115 cites.
  70. Authenticated hash tables“. C Papamanthou, R Tamassia…. 2008. Proceedings of the 15th …. 114 cites.
  71. Efficient audit service outsourcing for data integrity in clouds“. Y Zhu, H Hu, GJ Ahn, SS Yau. 2012. Elsevier Journal of Systems and Software. 112 cites.
  72. Practical dynamic proofs of retrievability“. E Shi, E Stefanov, C Papamanthou. 2013. Proceedings of the 2013 ACM …. 112 cites.
  73. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction“. A Narayanan, J Bonneau, E Felten, A Miller…. 2016. . 109 cites.
  74. Certificate revocation in vehicular networks“. M Raya, D Jungels, P Papadimitratos…. 2006. … (LCA) School of …. 107 cites.
  75. A next-generation smart contract and decentralized application platform“. V Buterin. 2014. white paper. 105 cites.
  76. Differing-Inputs Obfuscation and Applications.“. P Ananth, D Boneh, S Garg…. 2013. IACR Cryptology …. 104 cites.
  77. Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage“. K Kursawe, AR Sadeghi, D Schellekens…. 2009. … Security and Trust …. 104 cites.
  78. Tree-based certificate revocation system“. S Micali. 2000. Google Patents US Patent 6,097,811. 104 cites.
  79. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly“. B Rogers, S Chhabra, M Prvulovic…. 2007. … , 2007. MICRO 2007 …. 102 cites.
  80. Efficient certificate revocation“. S Micali. 2002. Google Patents US Patent 6,487,658. 101 cites.
  81. Hardware-rooted trust for secure key management and transient trust“. JS Dwoskin, RB Lee. 2007. Proceedings of the 14th ACM conference on …. 101 cites.
  82. Optimal verification of operations on dynamic sets“. C Papamanthou, R Tamassia…. 2011. Springer Annual Cryptology …. 98 cites.
  83. Fractal Merkle tree representation and traversal“. M Jakobsson, T Leighton, S Micali, M Szydlo. 2003. Springer Cryptographers’ Track at the …. 97 cites.
  84. SIA: Secure information aggregation in sensor networks“. H Chan, A Perrig, B Przydatek…. 2007. Journal of Computer …. 97 cites.
  85. Sabotage-tolerance and trust management in desktop grid computing“. P Domingues, B Sousa, LM Silva. 2007. Elsevier Future Generation Computer Systems. 96 cites.
  86. SecCloud: Bridging secure storage and computation in cloud“. L Wei, H Zhu, Z Cao, W Jia…. 2010. … (ICDCSW), 2010 IEEE …. 96 cites.
  87. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks“. P Sakarindr, N Ansari. 2007. IEEE Wireless Communications. 95 cites.
  88. An efficient merkle-tree-based authentication scheme for smart grid“. H Li, R Lu, L Zhou, B Yang, X Shen. 2014. IEEE Systems Journal. 94 cites.
  89. Efficient and fresh certification“. I Gassko, PS Gemmell, P MacKenzie. 2000. Springer Public Key Cryptography. 94 cites.
  90. Certifying Program Execution with Secure Processors.“. B Chen, R Morris. 2003. HotOS. 93 cites.
  91. Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2.“. J Guo, S Ling, C Rechberger, H Wang. 2010. Springer ASIACRYPT. 91 cites.
  92. Castor: Scalable secure routing for ad hoc networks“. W Galuba, P Papadimitratos…. 2010. INFOCOM, 2010 …. 88 cites.
  93. Multicast authentication in fully adversarial networks“. A Lysyanskaya, R Tamassia…. 2004. Security and Privacy …. 88 cites.
  94. Partially materialized digest scheme: an efficient verification method for outsourced databases“. K Mouratidis, D Sacharidis, HH Pang. 2009. The VLDB Journal—The …. 88 cites.
  95. All about Eve: Execute-Verify Replication for Multi-Core Servers.“. M Kapritsos, Y Wang, V Quema, A Clement, L Alvisi…. 2012. OSDI. 87 cites.
  96. Let’s chronosync: Decentralized dataset state synchronization in named data networking“. Z Zhu, A Afanasyev. 2013. Network Protocols (ICNP), 2013 21st IEEE …. 84 cites.
  97. Seven-property-preserving iterated hashing: ROX“. E Andreeva, G Neven, B Preneel…. 2007. Springer Advances in Cryptology …. 84 cites.
  98. Tree-based certificate revocation system“. S Micali. 2001. Google Patents US Patent 6,301,659. 84 cites.
  99. XMSS-a practical forward secure signature scheme based on minimal security assumptions“. J Buchmann, E Dahmen, A Hülsing. 2011. Springer Post-Quantum Cryptography. 84 cites.
  100. Blocked tree authorization and status systems“. F Sudia. 2004. Google Patents US Patent App. 10/949,712. 83 cites.
  101. An efficient integrity-preserving scheme for hierarchical sensor aggregation“. KB Frikken, JA Dougherty IV. 2008. Proceedings of the first ACM conference …. 81 cites.
  102. End-to-end Data Integrity for File Systems: A ZFS Case Study.“. Y Zhang, A Rajimwale, AC Arpaci-Dusseau…. 2010. FAST. 81 cites.
  103. Payment processing method and system“. R Nix, A Mesarovich, T Schwartz…. 2005. Google Patents US Patent App. 11 …. 81 cites.
  104. Cryptographic method for updating financial records“. SM Matyas. 1993. Google Patents US Patent 5,231,666. 79 cites.
  105. Cryptographic method for updating financial records“. SM Matyas. 1993. Google Patents US Patent 5,231,666. 79 cites.
  106. Efficient Data Structures For Tamper-Evident Logging.“. SA Crosby, DS Wallach. 2009. USENIX Security Symposium. 79 cites.
  107. Secure two-party computation with low communication“. I Damgård, S Faust, C Hazay. 2012. Springer Theory of cryptography. 78 cites.
  108. Robust and efficient data management for a distributed hash table“. J Cates. 2003. . 77 cites.
  109. CMSS-an improved merkle signature scheme“. J Buchmann, LCC García, E Dahmen, M Döring…. 2006. Springer INDOCRYPT. 76 cites.
  110. Design space exploration and optimization of path oblivious ram in secure processors“. L Ren, X Yu, CW Fletcher, M Van Dijk…. 2013. ACM SIGARCH …. 76 cites.
  111. Permacoin: Repurposing bitcoin work for data preservation“. A Miller, A Juels, E Shi, B Parno…. 2014. Security and Privacy (SP) …. 76 cites.
  112. An efficient broadcast authentication scheme in wireless sensor networks“. SM Chang, S Shieh, WW Lin, CM Hsieh. 2006. Proceedings of the 2006 ACM …. 75 cites.
  113. Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks“. A Baadache, A Belmehdi. 2010. arXiv preprint arXiv:1002.1681. 75 cites.
  114. Verifying computations with state“. B Braun, AJ Feldman, Z Ren, S Setty…. 2013. Proceedings of the …. 75 cites.
  115. Enhanced Certificate Transparency and End-to-End Encrypted Mail.“. MD Ryan. 2014. NDSS. 74 cites.
  116. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.“. Y Lu. 2012. NDSS. 74 cites.
  117. Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.“. S Goldwasser, H Lin, A Rubinstein. 2011. IACR Cryptology ePrint Archive. 73 cites.
  118. On the random-oracle methodology as applied to length-restricted signature schemes“. R Canetti, O Goldreich, S Halevi. 2004. Springer TCC. 73 cites.
  119. Self-verifying names for read-only named data“. M Baugher, B Davie, A Narayanan…. 2012. … WKSHPS), 2012 IEEE …. 73 cites.
  120. Jumbo Store: Providing Efficient Incremental Upload and Versioning for a Utility Rendering Service.“. K Eshghi, M Lillibridge, L Wilcock, G Belrose…. 2007. FAST. 72 cites.
  121. A parameter-adaptive dynamic programming approach for inferring cophylogenies“. D Merkle, M Middendorf…. 2010. bmcbioinformatics.biomedcentral … BMC …. 71 cites.
  122. A remote password authentication scheme based on the digital signature method“. MS Hwang. 1999. Taylor & Francis International Journal of Computer Mathematics. 71 cites.
  123. Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland …“. C Cachin. 2004. . 71 cites.
  124. Enabling the Archival Storage of Signed Documents.“. P Maniatis, M Baker. 2002. FAST. 71 cites.
  125. Secure multihop network programming with multiple one-way key chains“. H Tan, J Zic, S Jha, D Ostry. 2011. IEEE Transactions on Mobile …. 71 cites.
  126. Encryption and authentication for scalable multimedia: Current state of the art and challenges“. BB Zhu, MD Swanson, S Li. 2004. Proc. SPIE. 69 cites.
  127. Flooding-resilient broadcast authentication for vanets“. HC Hsiao, A Studer, C Chen, A Perrig, F Bai…. 2011. Proceedings of the 17th …. 69 cites.
  128. Indistinguishability obfuscation for turing machines with unbounded memory“. V Koppula, AB Lewko, B Waters. 2015. … of the forty-seventh annual ACM …. 69 cites.
  129. Optimizing BGP security by exploiting path stability“. K Butler, P McDaniel, W Aiello. 2006. … of the 13th ACM conference on …. 69 cites.
  130. Proof-infused streams: Enabling authentication of sliding window queries on streams“. F Li, K Yi, M Hadjieleftheriou, G Kollios. 2007. Proceedings of the 33rd …. 69 cites.
  131. How to manage persistent state in DRM systems“. W Shapiro, R Vingralek. 2001. Springer ACM Workshop on Digital Rights Management. 68 cites.
  132. On protecting integrity and confidentiality of cryptographic file system for outsourced storage“. A Yun, C Shi, Y Kim. 2009. Proceedings of the 2009 ACM workshop on Cloud …. 68 cites.
  133. SecureME: a hardware-software approach to full system security“. S Chhabra, B Rogers, Y Solihin…. 2011. Proceedings of the …. 68 cites.
  134. Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection“. G Duc, R Keryell. 2006. … Conference, 2006. ACSAC’06. 22nd Annual. 67 cites.
  135. EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks“. X Zhang, J He, Q Wei. 2011. Springer EURASIP Journal on Wireless Communications …. 67 cites.
  136. Mercurial Commitments with Applications to Zero-Knowledge Sets.“. M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin. 2005. Springer Eurocrypt. 66 cites.
  137. On securing untrusted clouds with cryptography“. Y Chen, R Sion. 2010. Proceedings of the 9th annual ACM workshop on …. 66 cites.
  138. Merkle signatures with virtually unlimited signature capacity“. J Buchmann, E Dahmen, E Klintsevich, K Okeya…. 2007. Springer … and Network Security. 65 cites.
  139. Hardware mechanisms for memory authentication: A survey of existing techniques and engines“. R Elbaz, D Champagne, C Gebotys, R Lee…. 2009. Springer Transactions on …. 64 cites.
  140. Hash based digital signature schemes“. C Dods, NP Smart, M Stam. 2005. Springer Lecture notes in computer science. 64 cites.
  141. CADS: Continuous authentication on data streams“. S Papadopoulos, Y Yang, D Papadias. 2007. Proceedings of the 33rd …. 63 cites.
  142. Short Redactable Signatures Using Random Trees.“. EC Chang, CL Lim, J Xu. 2009. Springer CT-RSA. 62 cites.
  143. Trust but verify: accountability for network services“. AR Yumerefendi, JS Chase. 2004. Proceedings of the 11th workshop on ACM …. 62 cites.
  144. Distributed user access control in sensor networks“. H Wang, Q Li. 2006. Springer DCOSS. 61 cites.
  145. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification“. S Haber, Y Hatano, Y Honda, W Horne…. 2008. Proceedings of the …. 61 cites.
  146. Joint topology control and authentication design in mobile ad hoc networks with cooperative communications“. Q Guan, FR Yu, S Jiang…. 2012. IEEE Transactions on …. 61 cites.
  147. Providing freshness guarantees for outsourced databases“. M Xie, H Wang, J Yin, X Meng. 2008. … of the 11th international conference on …. 61 cites.
  148. Defense against intrusion in a live streaming multicast system“. M Haridasan, R van Renesse. 2006. Peer-to-Peer Computing, 2006 …. 60 cites.
  149. Vector Commitments and Their Applications.“. D Catalano, D Fiore. 2013. Springer Public Key Cryptography. 59 cites.
  150. A coding-theoretic approach for efficient message verification over insecure channels“. D Slater, P Tague, R Poovendran, BJ Matt. 2009. Proceedings of the second …. 58 cites.
  151. Certificate revocation using fine grained certificate space partitioning“. V Goyal. 2007. Springer … Conference on Financial Cryptography and Data …. 58 cites.
  152. Efficient verification of shortest path search via authenticated hints“. ML Yiu, Y Lin, K Mouratidis. 2010. Data Engineering (ICDE), 2010 …. 58 cites.
  153. Spatial query integrity with voronoi neighbors“. L Hu, WS Ku, S Bakiras…. 2013. IEEE Transactions on …. 58 cites.
  154. Efficient consistency proofs for generalized queries on a committed database“. R Ostrovsky, C Rackoff, A Smith. 2004. Springer ICALP. 57 cites.
  155. CONIKS: Bringing Key Transparency to End Users.“. MS Melara, A Blankstein, J Bonneau…. 2015. USENIX Security …. 56 cites.
  156. Peppercoin micropayments“. RL Rivest. 2004. Springer Financial Cryptography. 56 cites.
  157. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks“. H Tan, D Ostry, J Zic, S Jha. 2013. Elsevier Computers & Security. 55 cites.
  158. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.“. AJ Feldman, A Blankstein, MJ Freedman…. 2012. USENIX Security …. 55 cites.
  159. Authentication of moving kNN queries“. ML Yiu, E Lo, D Yung. 2011. Data Engineering (ICDE), 2011 IEEE …. 54 cites.
  160. Shroud: ensuring private access to large-scale data in the data center.“. JR Lorch, B Parno, JW Mickens, M Raykova…. 2013. FAST. 54 cites.
  161. Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks“. R Elbaz, D Champagne, R Lee, L Torres…. 2007. Springer … and Embedded Systems …. 54 cites.
  162. Scalable zero knowledge via cycles of elliptic curves“. E Ben-Sasson, A Chiesa, E Tromer, M Virza. 2017. Springer Algorithmica. 53 cites.
  163. Obfuscated databases and group privacy“. A Narayanan, V Shmatikov. 2005. Proceedings of the 12th ACM conference on …. 52 cites.
  164. Certificate transparency“. B Laurie. 2014. Queue. 51 cites.
  165. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks“. Q Li, M Zhao, J Walker, YC Hu, A Perrig…. 2009. Wiley Online Library Security and …. 51 cites.
  166. Efficient data protection for distributed shared memory multiprocessors“. B Rogers, M Prvulovic, Y Solihin. 2006. Parallel Architectures and …. 50 cites.
  167. Antiquity: exploiting a secure log for wide-area distributed storage“. H Weatherspoon, P Eaton, BG Chun…. 2007. ACM SIGOPS Operating …. 48 cites.
  168. Hourglass schemes: how to prove that cloud files are encrypted“. M Van Dijk, A Juels, A Oprea, RL Rivest…. 2012. Proceedings of the …. 48 cites.
  169. An opportunistic batch bundle authentication scheme for energy constrained DTNs“. H Zhu, X Lin, R Lu, X Shen, D Xing…. 2010. … 2010 Proceedings IEEE. 46 cites.
  170. Optimal parameter selection for efficient memory integrity verification using merkle hash trees“. D Williams, EG Sirer. 2004. Network Computing and Applications …. 46 cites.
  171. Power consumption evaluation of efficient digital signature schemes for low power devices“. S Seys, B Preneel. 2005. Wireless And Mobile Computing …. 46 cites.
  172. Scalable security for petascale parallel file systems“. AW Leung, EL Miller, S Jones. 2007. … 2007. SC’07. Proceedings of the …. 46 cites.
  173. Efficient data authentication in an environment of untrusted third-party distributors“. MJ Atallah, YS Cho, A Kundu. 2008. Data Engineering, 2008. ICDE …. 45 cites.
  174. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks.“. MJ Miller, NH Vaidya. 2006. INFOCOM. 45 cites.
  175. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks“. A Baadache, A Belmehdi. 2012. Elsevier Journal of Network and Computer Applications. 44 cites.
  176. Incrementally verifiable computation or proofs of knowledge imply time/space efficiency“. P Valiant. 2008. Springer Theory of Cryptography. 44 cites.
  177. Stack and queue integrity on hostile platforms“. PT Devanbu, SG Stubblebine. 2002. IEEE Transactions on Software …. 44 cites.
  178. The trusted execution module: Commodity general-purpose trusted computing“. V Costan, L Sarmenta, M Van Dijk…. 2008. Springer Smart Card Research and …. 44 cites.
  179. The trusted execution module: Commodity general-purpose trusted computing“. V Costan, L Sarmenta, M Van Dijk…. 2008. Springer Smart Card Research and …. 44 cites.
  180. Zero-knowledge sets with short proofs“. D Catalano, D Fiore, M Messina. 2008. Springer … on the Theory and Applications of …. 44 cites.
  181. Caches and merkle trees for efficient memory authentication“. B Gassend, E Suh, D Clarke, M Van Dijk…. 2003. Proceedings of Ninth …. 43 cites.
  182. Misbehavior in bitcoin: A study of double-spending and accountability“. GO Karame, E Androulaki, M Roeschlin…. 2015. ACM Transactions on …. 43 cites.
  183. A Remark on a Signature Scheme where Forgery can be Proved“. G Bleumer, B Pfitzmann, M Waidner. 1990. Springer … on the Theory and Application of of …. 42 cites.
  184. ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication“. T Heer, S Götz, OG Morchon, K Wehrle. 2008. Proceedings of the 2008 ACM …. 42 cites.
  185. Formal aspects of fail-stop signatures“. B Pfitzmann, M Waidner. 1990. . 42 cites.
  186. Merkle Tree Traversal Revisited.“. JA Buchmann, E Dahmen, M Schneider. 2008. Springer PQCrypto. 42 cites.
  187. NoSQL systems for big data management“. VN Gudivada, D Rao…. 2014. … (SERVICES), 2014 IEEE …. 42 cites.
  188. Quasimodo: Efficient certificate validation and revocation“. FF Elwailly, C Gentry, Z Ramzan. 2004. Springer Public Key Cryptography. 42 cites.
  189. Verifying computations with streaming interactive proofs“. G Cormode, J Thaler, K Yi. 2011. Proceedings of the VLDB Endowment. 42 cites.
  190. A content integrity service for long-term digital archives“. S Haber, P Kamat. 2006. Archiving Conference. 41 cites.
  191. Concise mercurial vector commitments and independent zero-knowledge sets with short proofs“. B Libert, M Yung. 2010. Springer Theory of Cryptography Conference. 41 cites.
  192. Cryptographic Security for a High-Performance Distributed File System.“. R Pletka, C Cachin. 2007. MSST. 41 cites.
  193. Gnatdb: A small-footprint, secure database system“. R Vingralek. 2002. Proceedings of the 28th international conference on …. 41 cites.
  194. Ensuring content integrity for untrusted peer-to-peer content distribution networks“. N Michalakis, R Soulé, R Grimm. 2007. … of the 4th USENIX conference on …. 40 cites.
  195. Ipfs-content addressed, versioned, p2p file system“. J Benet. 2014. arXiv preprint arXiv:1407.3561. 40 cites.
  196. Replication, history, and grafting in the ori file system“. AJ Mashtizadeh, A Bittau, YF Huang…. 2013. Proceedings of the …. 40 cites.
  197. Succinct NP proofs from an extractability assumption“. G Di Crescenzo, H Lipmaa. 2008. Springer Conference on Computability in Europe. 40 cites.
  198. Transparent, distributed, and replicated dynamic provable data possession“. M Etemad, A Küpçü. 2013. Springer … Conference on Applied Cryptography and Network …. 40 cites.
  199. A flexible and scalable authentication scheme for JPEG2000 image codestreams“. C Peng, RH Deng, Y Wu, W Shao. 2003. Proceedings of the eleventh ACM …. 39 cites.
  200. How to update documents verifiably in searchable symmetric encryption“. K Kurosawa, Y Ohtaki. 2013. Springer … Conference on Cryptology and Network Security. 39 cites.
  201. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.“. A Oprea, MK Reiter. 2007. USENIX Security Symposium. 39 cites.
  202. Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions“. G Itkis. 2002. Springer … Conference on Security in Communication Networks. 39 cites.
  203. Secure data discovery and dissemination based on hash tree for wireless sensor networks“. D He, S Chan, S Tang, M Guizani. 2013. IEEE transactions on …. 39 cites.
  204. Verifiable Oblivious Storage.“. D Apon, J Katz, E Shi…. 2014. Public Key Cryptography. 39 cites.
  205. Fast hash-based signatures on constrained devices“. S Rohde, T Eisenbarth, E Dahmen, J Buchmann…. 2008. Springer CARDIS. 38 cites.
  206. Min-round resettable zero-knowledge in the public-key model“. S Micali, L Reyzin. 2001. Springer International Conference on the Theory and …. 38 cites.
  207. Providing efficient privacy-aware incentives for mobile sensing“. Q Li, G Cao. 2014. … Computing Systems (ICDCS), 2014 IEEE 34th …. 38 cites.
  208. Updatable zero-knowledge databases“. M Liskov. 2005. Springer Asiacrypt. 38 cites.
  209. A dynamic Proof of Retrievability (PoR) scheme with O (logn) complexity“. Z Mo, Y Zhou, S Chen. 2012. Communications (ICC), 2012 IEEE …. 37 cites.
  210. On Provably Secure Time-Stamping Schemes.“. A Buldas, M Saarepera. 2004. Springer ASIACRYPT. 37 cites.
  211. Optimal Authenticated Data Structures with Multilinear Forms.“. C Papamanthou, R Tamassia, N Triandopoulos. 2010. Springer Pairing. 37 cites.
  212. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks“. H Lin, J Ma, J Hu, K Yang. 2012. Springer EURASIP Journal on Wireless …. 37 cites.
  213. Two 1-Round Protocols for Delegation of Computation.“. R Canetti, B Riva, GN Rothblum. 2011. IACR Cryptology ePrint …. 37 cites.
  214. On kabatianskii-krouk-smeets signatures“. PL Cayrel, A Otmani, D Vergnaud. 2007. Springer WAIFI. 36 cites.
  215. One-time signatures revisited: Have they become practical?“. D Naor, A Shenhav, A Wool. 2005. IACR Cryptology ePrint Archive. 36 cites.
  216. OverCite: A Distributed, Cooperative CiteSeer.“. J Stribling, J Li, IG Councill, MF Kaashoek, R Morris. 2006. NSDI. 36 cites.
  217. Scalable security for large, high performance storage systems“. AW Leung, EL Miller. 2006. Proceedings of the second ACM workshop on …. 36 cites.
  218. The hunting of the SNARK“. N Bitansky, R Canetti, A Chiesa, S Goldwasser…. 2017. Springer Journal of …. 36 cites.
  219. The performance impact of BGP security“. M Zhao, SW Smith, DM Nicol. 2005. IEEE network. 36 cites.
  220. MABS: Multicast authentication based on batch signature“. Y Zhou, X Zhu, Y Fang. 2010. IEEE Transactions on Mobile …. 35 cites.
  221. Parallelizable authentication trees“. WE Hall, CS Jutla. 2005. Springer Selected Areas in Cryptography. 35 cites.
  222. Verified query results from hybrid authentication trees“. G Nuckolls. 2005. Springer DBSec. 35 cites.
  223. Efficient long-term validation of digital signatures“. A Ansper, A Buldas, M Roos, J Willemson. 2001. Springer Public Key Cryptography. 34 cites.
  224. Fast approximate reconciliation of set differences“. J Byers, J Considine, M Mitzenmacher. 2002. . 34 cites.
  225. Improving public auditability, data possession in data storage security for cloud computing“. M Venkatesh, MR Sumalatha…. 2012. Recent Trends In …. 34 cites.
  226. Optimal trade-off for Merkle tree traversal“. P Berman, M Karpinski, Y Nekrich. 2005. Springer International Conference on E …. 34 cites.
  227. Proofs of space: When space is of the essence“. G Ateniese, I Bonacina, A Faonio, N Galesi. 2014. Springer International Conference on …. 34 cites.
  228. C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks“. Q Jing, J Hu, Z Chen. 2006. Mobile Adhoc and Sensor Systems …. 33 cites.
  229. Efficient content authentication in peer-to-peer networks“. R Tamassia, N Triandopoulos. 2007. Springer Applied Cryptography and Network …. 33 cites.
  230. Fast checking of individual certificate revocation on small systems“. S Russell. 1999. … Security Applications Conference, 1999.(ACSAC’99 …. 33 cites.
  231. Freecursive oram:[nearly] free recursion and integrity verification for position-based oblivious ram“. CW Fletcher, L Ren, A Kwon, M van Dijk…. 2015. ACM SIGPLAN …. 33 cites.
  232. On the communication complexity of secure function evaluation with long output“. P Hubacek, D Wichs. 2015. Proceedings of the 2015 Conference on …. 33 cites.
  233. Virtual machine images as structured data: the mirage image library“. G Ammons, V Bala, T Mummert, D Reimer…. 2011. Proceedings of the …. 33 cites.
  234. XPay: Practical anonymous payments for Tor routing and other networked services“. Y Chen, R Sion, B Carbunar. 2009. Proceedings of the 8th ACM workshop on …. 33 cites.
  235. Authenticated data structures, generically“. A Miller, M Hicks, J Katz, E Shi. 2014. ACM SIGPLAN Notices. 32 cites.
  236. Content routers: Fetching data on network path“. W Wong, M Giraldi, MF Magalhaes…. 2011. … (ICC), 2011 IEEE …. 32 cites.
  237. Efficient distributed security for wireless medical sensor networks“. OG Morchon, H Baldus. 2008. Intelligent Sensors, Sensor Networks …. 32 cites.
  238. One-time signature scheme from syndrome decoding over generic error-correcting codes“. PSLM Barreto, R Misoczki, MA Simplicio Jr. 2011. Elsevier Journal of Systems and …. 32 cites.
  239. SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks“. MS Islam, MA Hamid, CS Hong. 2009. Springer Transactions on Computational Science …. 32 cites.
  240. Verifying spatial queries using Voronoi neighbors“. L Hu, WS Ku, S Bakiras, C Shahabi. 2010. Proceedings of the 18th …. 32 cites.
  241. Efficient content authentication in peer-to-peer networks“. R Tamassia, N Triandopoulos. 2011. Google Patents US Patent 7,974,221. 31 cites.
  242. Minimal information disclosure with efficiently verifiable credentials“. D Bauer, DM Blough, D Cash. 2008. Proceedings of the 4th ACM workshop on …. 31 cites.
  243. Multimedia Broadcast Authentication Based on Batch Signature [Advances in Mobile Multimedia]“. Y Zhou, Y Fang. 2007. IEEE Communications Magazine. 31 cites.
  244. On Bitcoin as a public randomness source.“. J Bonneau, J Clark, S Goldfeder. 2015. IACR Cryptology ePrint …. 31 cites.
  245. Robustness in the Salus Scalable Block Store.“. Y Wang, M Kapritsos, Z Ren, P Mahajan…. 2013. NSDI. 31 cites.
  246. Secure auditing and deduplicating data in cloud“. J Li, J Li, D Xie, Z Cai. 2016. IEEE Transactions on Computers. 31 cites.
  247. Verifiable data streaming“. D Schröder, H Schröder. 2012. Proceedings of the 2012 ACM conference on …. 31 cites.
  248. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme“. O Ugus, D Westhoff, JM Bohli. 2009. … of the second ACM conference on …. 30 cites.
  249. A secure client side deduplication scheme in cloud storage environments“. N Kaaniche, M Laurent. 2014. New Technologies, Mobility and …. 30 cites.
  250. Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring“. ST Ali, V Sivaraman, D Ostry. 2014. Elsevier Future Generation Computer Systems. 30 cites.
  251. Independent zero-knowledge sets“. R Gennaro, S Micali. 2006. Springer Automata, Languages and Programming. 30 cites.
  252. Integrity verification for path oblivious-ram“. L Ren, CW Fletcher, X Yu, M Van Dijk…. 2013. … (HPEC), 2013 IEEE. 30 cites.
  253. SecureStream: An intrusion-tolerant protocol for live-streaming dissemination“. M Haridasan, R van Renesse. 2008. Elsevier Computer Communications. 30 cites.
  254. Statistically Hiding Sets.“. M Prabhakaran, R Xue. 2009. Springer CT-RSA. 30 cites.
  255. Explicit Non-Malleable Codes Resistant to Permutations.“. S Agrawal, D Gupta, HK Maji…. 2014. Electronic …. 29 cites.
  256. Revocation transparency“. B Laurie, E Kasper. 2012. Google Research, September. 29 cites.
  257. Digital Signatures Out of Second-Preimage Resistant Hash Functions.“. E Dahmen, K Okeya, T Takagi, C Vuillaume. 2008. Springer PQCrypto. 28 cites.
  258. Exploring the pub/sub routing & forwarding space“. A Zahemszky, A Császár, P Nikander…. 2009. Communications …. 28 cites.
  259. Locally Decodable and Updatable Non-Malleable Codes and Their Applications.“. D Dachman-Soled, FH Liu, E Shi, HS Zhou. 2015. TCC (1). 28 cites.
  260. Roles and security in a publish/subscribe network architecture“. D Lagutin, K Visala, A Zahemszky…. 2010. … (ISCC), 2010 IEEE …. 28 cites.
  261. Single-level integrity and confidentiality protection for distributed shared memory multiprocessors“. B Rogers, C Yan, S Chhabra…. 2008. … , 2008. HPCA 2008 …. 28 cites.
  262. Transparent data deduplication in the cloud“. F Armknecht, JM Bohli, GO Karame…. 2015. Proceedings of the 22nd …. 28 cites.
  263. A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable.“. C Wang, Y Zhou. 2010. HotCloud. 27 cites.
  264. A secure incentive scheme for delay tolerant networks“. H Zhu, X Lin, R Lu, X Shen. 2008. Communications and Networking …. 27 cites.
  265. An intelligent approach for building a secure decentralized public key infrastructure in VANET“. N Kumar, R Iqbal, S Misra, JJPC Rodrigues. 2015. Elsevier Journal of Computer and …. 27 cites.
  266. Authenticated in-network programming for wireless sensor networks“. I Krontiris, T Dimitriou. 2006. Springer Lecture notes in computer science. 27 cites.
  267. Efficient query integrity for outsourced dynamic databases“. Q Zheng, S Xu, G Ateniese. 2012. Proceedings of the 2012 ACM Workshop on …. 27 cites.
  268. Non-interactive timestamping in the bounded storage model“. T Moran, R Shaltiel, A Ta-Shma. 2004. Springer CRYPTO. 27 cites.
  269. Streaming authenticated data structures“. C Papamanthou, E Shi, R Tamassia, K Yi. 2013. Springer … International Conference on …. 27 cites.
  270. A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms“. G Yang, JT Wang, HB Cheng…. 2007. Dianzi Xuebao(Acta …. 26 cites.
  271. Access control friendly query verification for outsourced data publishing“. H Chen, X Ma, W Hsu, N Li, Q Wang. 2008. Springer European Symposium on Research …. 26 cites.
  272. Authenticated dictionaries: Real-world costs and trade-offs“. SA Crosby, DS Wallach. 2011. ACM Transactions on Information and System …. 26 cites.
  273. Deduplication on encrypted big data in cloud“. Z Yan, W Ding, X Yu, H Zhu…. 2016. IEEE transactions on big …. 26 cites.
  274. Detecting blackhole attacks on DSR-based mobile ad hoc networks“. I Woungang, SK Dhurandher, RD Peddi…. 2012. Computer …. 26 cites.
  275. On the privacy provisions of bloom filters in lightweight bitcoin clients“. A Gervais, S Capkun, GO Karame…. 2014. Proceedings of the 30th …. 26 cites.
  276. Secure data outsourcing based on threshold secret sharing; towards a more practical solution“. MA Hadavi, R Jalili. 2010. Proc. VLDB PhD Workshop. 26 cites.
  277. A tunable proof of ownership scheme for deduplication using bloom filters“. J Blasco, R Di Pietro, A Orfila…. 2014. … and Network Security …. 25 cites.
  278. Authentication of scalable video streams with low communication overhead“. K Mokhtarian, M Hefeeda. 2010. IEEE Transactions on multimedia. 25 cites.
  279. Secure remote execution of sequential computations“. GO Karame, M Strasser, S Čapkun. 2009. Springer International Conference on …. 25 cites.
  280. Sine: Cache-friendly integrity for the web“. C Gaspard, S Goldberg, W Itani…. 2009. … , 2009. NPSec 2009 …. 25 cites.
  281. Tightly-secure signatures from chameleon hash functions“. O Blazy, SA Kakvi, E Kiltz, J Pan. 2015. Springer IACR International Workshop on Public …. 25 cites.
  282. A secure hybrid wireless mesh protocol for 802.11 s mesh network“. MS Islam, YJ Yoon, MA Hamid, CS Hong. 2008. Springer International Conference on …. 24 cites.
  283. A tree-based forward digest protocol to verify data integrity in distributed media streaming“. A Habib, D Xu, M Atallah, B Bhargava…. 2005. IEEE Transactions on …. 24 cites.
  284. Cloud security: Issues and concerns“. P Samarati, SDC di Vimercati…. 2016. … on Cloud Computing. 24 cites.
  285. End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media“. C Gentry, A Hevia, R Jain, T Kawahara…. 2005. IEEE Journal on …. 24 cites.
  286. Method and apparatus for secure and small credits for verifiable service provider metering“. CB Gentry, ZA Ramzan. 2009. Google Patents US Patent 7,620,606. 24 cites.
  287. On broadcast authentication in wireless sensor networks“. K Ren, K Zeng, W Lou, PJ Moran. 2006. Springer International Conference on Wireless …. 24 cites.
  288. Optimal parameters for XMSSMT“. A Hülsing, L Rausch, J Buchmann. 2013. Springer International Conference on …. 24 cites.
  289. Repairing return address stack for buffer overflow protection“. YJ Park, G Lee. 2004. Proceedings of the 1st conference on Computing …. 24 cites.
  290. Strong worm“. R Sion. 2008. Distributed Computing Systems, 2008. ICDCS’08. The …. 24 cites.
  291. Efficient attribute authentication with applications to ad hoc networks“. M Jakobsson, S Wetzel. 2004. Proceedings of the 1st ACM international …. 23 cites.
  292. Performance analysis of the Libswift P2P streaming protocol“. R Petrocco, J Pouwelse…. 2012. Peer-to-Peer Computing …. 23 cites.
  293. Data dynamics for remote data possession checking in cloud storage“. L Chen, S Zhou, X Huang, L Xu. 2013. Elsevier Computers & Electrical Engineering. 22 cites.
  294. Decentralized trusted timestamping using the crypto currency bitcoin“. B Gipp, N Meuschke, A Gernandt. 2015. arXiv preprint arXiv:1502.04015. 22 cites.
  295. Forward Secure Signatures on Smart Cards.“. A Hülsing, C Busold, JA Buchmann. 2012. Springer Selected Areas in Cryptography. 22 cites.
  296. Hash-based signatures“. D McGrew, M Curcio. 2015. . 22 cites.
  297. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions“. A Miller, A Kosba, J Katz, E Shi. 2015. Proceedings of the 22nd ACM SIGSAC …. 22 cites.
  298. Short Hash-Based Signatures for Wireless Sensor Networks.“. E Dahmen, C Krauß. 2009. Springer CANS. 22 cites.
  299. A system for end-to-end authentication of adaptive multimedia content“. T Suzuki, Z Ramzan, H Fujimoto, C Gentry…. 2005. Springer … and Multimedia Security. 21 cites.
  300. A universally composable scheme for electronic cash“. M Trolin. 2005. Springer Progress in Cryptology-INDOCRYPT 2005. 21 cites.
  301. An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks.“. M Haque, ASK Pathan, CS Hong…. 2008. KSII Transactions on …. 21 cites.
  302. CRTBA: Chinese remainder theorem-based broadcast authentication in wireless sensor networks“. J Zhang, W Yu, X Liu. 2009. Computer Network and Multimedia …. 21 cites.
  303. Forensic snapshot“. MD Lillibridge, K Keeton. 2008. Google Patents US Patent App. 12/290,617. 21 cites.
  304. Knowledge-binding commitments with applications in time-stamping“. A Buldas, S Laur. 2007. Springer Public Key Cryptography–PKC 2007. 21 cites.
  305. Polylogarithmic two-round argument systems“. T Mie. 2008. Journal of Mathematical Cryptology. 21 cites.
  306. Post-Quantum Signatures.“. JA Buchmann, LCC García, M Döring…. 2004. IACR Cryptology …. 21 cites.
  307. PUF-based authentication protocols–revisited“. H Busch, S Katzenbeisser, P Baecher. 2009. Springer International Workshop on …. 21 cites.
  308. Scatter–secure code authentication for efficient reprogramming in wireless sensor networks“. I Krontiris, T Dimitriou. 2011. International Journal of Sensor …. 21 cites.
  309. Symmetric-key based proofs of retrievability supporting public verification“. C Guan, K Ren, F Zhang, F Kerschbaum…. 2015. Springer European Symposium on …. 21 cites.
  310. A new timestamping scheme based on skip lists“. K Blibech, A Gabillon. 2006. Springer Computational Science and Its Applications-ICCSA …. 20 cites.
  311. A survey of access control schemes in wireless sensor networks“. Y Faye, I Niang, T Noel. 2011. Proc. World Acad. Sci. Eng. Tech. 20 cites.
  312. An efficient confidentiality-preserving proof of ownership for deduplication“. L González-Manzano, A Orfila. 2015. Elsevier Journal of Network and Computer …. 20 cites.
  313. Cooperative security in distributed networks“. O Garcia-Morchon, D Kuptsov, A Gurtov…. 2013. Elsevier Computer …. 20 cites.
  314. Data Transmission Optimization“. S Tarkoma. 2009. Google Patents US Patent App. 13/318,345. 20 cites.
  315. Domain based storage protection with secure access control for the cloud“. N Paladi, A Michalas, C Gehrmann. 2014. Proceedings of the 2nd …. 20 cites.
  316. Efficient generic forward-secure signatures and proxy signatures“. B Alomair, K Sampigethaya, R Poovendran. 2008. Springer Public Key Infrastructure. 20 cites.
  317. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey“. M Vigil, J Buchmann, D Cabarcas, C Weinert…. 2015. Elsevier Computers & …. 20 cites.
  318. On the security and the efficiency of the Merkle signature scheme“. LCC Garcıa. 2005. . 20 cites.
  319. Publicly verifiable proofs of sequential work“. M Mahmoody, T Moran, S Vadhan. 2013. … of the 4th conference on Innovations …. 20 cites.
  320. Quasiperiodic Sturmian words and morphisms“. F Levé, G Richomme. 2007. Elsevier Theoretical computer science. 20 cites.
  321. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.“. L Luu, V Narayanan, K Baweja, C Zheng…. 2015. IACR Cryptology …. 20 cites.
  322. Secure time-stamping schemes: A distributed point of view“. A Bonnecaze, P Liardet, A Gabillon…. 2006. Springer Annals of …. 20 cites.
  323. Content identification for peer-to-peer content retrieval“. RT Rao, KE Ahmed, RS Briggs, SA Plant. 2012. Google Patents US Patent 8,112,477. 19 cites.
  324. Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.“. S Seys, B Preneel. 2005. Springer SPC. 19 cites.
  325. Efficient verification of web-content searching through authenticated web crawlers“. MT Goodrich, C Papamanthou, D Nguyen…. 2012. Proceedings of the …. 19 cites.
  326. Keyless signatures’ infrastructure: How to build global distributed hash-trees“. A Buldas, A Kroonmaa, R Laanoja. 2013. Springer Nordic Conference on Secure IT …. 19 cites.
  327. Merkle signature schemes, merkle trees and their cryptanalysis“. G Becker. 2008. Ruhr-University Bochum, Tech. Rep.. 19 cites.
  328. Provable ownership of files in deduplication cloud storage“. C Yang, J Ren, J Ma. 2015. Wiley Online Library Security and Communication Networks. 19 cites.
  329. Software techniques to combat drift in puf-based authentication systems“. MS Kirkpatrick, E Bertino. 2010. Workshop on Secure Component and …. 19 cites.
  330. Toward Practical Private Access to Data Centers via Parallel ORAM.“. JR Lorch, JW Mickens, B Parno, M Raykova…. 2012. IACR Cryptology …. 19 cites.
  331. Verifiable and revocable expression of consent to processing of aggregated personal data“. H Pöhls. 2008. Springer Information and Communications Security. 19 cites.
  332. Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem“. MH Eldefrawy, MK Khan, K Alghathbar, ES Cho. 2010. Sensors. 18 cites.
  333. Cooperative public key authentication protocol in wireless sensor network“. DH Nyang, A Mohaisen. 2006. Springer UIC. 18 cites.
  334. Enforcing safety and consistency constraints in policy-based authorization systems“. AJ Lee, M Winslett. 2008. ACM Transactions on Information and System …. 18 cites.
  335. Merkle tree authentication of HTTP responses“. RJ Bayardo, J Sorensen. 2005. Special interest tracks and posters of the 14th …. 18 cites.
  336. Pollution in P2P live video streaming“. P Dhungel, X Hei, KW Ross…. 2009. International Journal of …. 18 cites.
  337. Secure acknowledgment aggregation and multisignatures with limited robustness“. C Castelluccia, S Jarecki, J Kim, G Tsudik. 2006. Elsevier Computer Networks. 18 cites.
  338. Supporting robust and secure interactions in open domains through recovery of trust negotiations“. AC Squicciarini, A Trombetta…. 2007. … Systems, 2007. ICDCS’ …. 18 cites.
  339. A distributed approach for secure M2M communications“. YB Saied, A Olivereau, M Laurent. 2012. New Technologies, Mobility …. 17 cites.
  340. A role based privacy-aware secure routing protocol for wireless mesh networks“. H Lin, J Hu, J Ma, L Xu, A Nagar. 2014. Springer Wireless Personal Communications. 17 cites.
  341. A security approach for off-chip memory in embedded microprocessor systems“. R Vaslin, G Gogniat, JP Diguet, E Wanderley…. 2009. Elsevier Microprocessors and …. 17 cites.
  342. Deypos: Deduplicatable dynamic proof of storage for multi-user environments“. K He, J Chen, R Du, Q Wu, G Xue…. 2016. IEEE Transactions on …. 17 cites.
  343. Ensuring correctness over untrusted private database“. S Singh, S Prabhakar. 2008. Proceedings of the 11th international conference …. 17 cites.
  344. Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.“. D Slamanig, S Rass. 2010. Springer Communications and Multimedia Security. 17 cites.
  345. IntegriDB: Verifiable SQL for outsourced databases“. Y Zhang, J Katz, C Papamanthou. 2015. Proceedings of the 22nd ACM …. 17 cites.
  346. MBS-OCSP: An OCSP based certificate revocation system for wireless environments“. D Berbecaru. 2004. … Technology, 2004. Proceedings of the Fourth …. 17 cites.
  347. Mobile agent route protection through hash-based mechanisms“. J Domingo-Ferrer. 2001. Springer Lecture notes in computer science. 17 cites.
  348. Sublinear scaling for multi-client private information retrieval“. W Lueks, I Goldberg. 2015. Springer … Conference on Financial Cryptography and Data …. 17 cites.
  349. A general model for authentic data publication“. C Martel, G Nuckolls, P Devanbu, M Gertz, A Kwong…. 2001. Algorithmica. 16 cites.
  350. Authenticated index structures for aggregation queries in outsourced databases“. F Li, M Hadjieleftheriou, G Kollios, L Reyzin. 2006. . 16 cites.
  351. Broadcast authentication in sensor networks using compressed bloom filters“. YS Chen, IL Lin, CL Lei, YH Liao. 2008. Springer Distributed Computing in Sensor …. 16 cites.
  352. CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.“. MS Melara, A Blankstein, J Bonneau…. 2014. IACR Cryptology ePrint …. 16 cites.
  353. Continuous spatial authentication“. S Papadopoulos, Y Yang, S Bakiras…. 2009. Springer … Symposium on Spatial …. 16 cites.
  354. Efficiently binding data to owners in distributed content-addressable storage systems“. P Eaton, H Weatherspoon…. 2005. Security in Storage …. 16 cites.
  355. Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET“. VA Hiremani, MM Jadhao. 2013. Green Computing, Communication …. 16 cites.
  356. Encryption and authentication of data and for decryption and verification of authenticity of data“. C Cachin, PT Hurley, RA Pletka. 2007. Google Patents US Patent App. 11/622,467. 16 cites.
  357. e-SAFE: An extensible, secure and fault tolerant storage system“. S Agarwala, A Paul, U Ramachandran…. 2007. Self-Adaptive and …. 16 cites.
  358. Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.“. A Biryukov, D Dinu, D Khovratovich. 2015. IACR Cryptology ePrint Archive. 16 cites.
  359. On Round-Efficient Argument Systems.“. H Wee. 2005. Springer ICALP. 16 cites.
  360. 云存储中的数据完整性证明研究及进展“. 谭霜, 贾焰, 韩伟红. 2015. 计算机学报. 16 cites.
  361. Bucket‐based authentication for outsourced databases“. J Wang, X Du, J Lu, W Lu. 2010. Wiley Online Library Concurrency and Computation …. 15 cites.
  362. Certifying data from multiple sources“. G Nuckolls, C Martel, SG Stubblebine. 2004. Springer Data and Applications Security …. 15 cites.
  363. Energy efficiency in M2M networks: A cooperative key establishment system“. YB Saied, A Olivereau…. 2011. … and Control Systems and …. 15 cites.
  364. One-time sensors: A novel concept to mitigate node-capture attacks“. K Bicakci, C Gamage, B Crispo…. 2005. Springer … on Security in Ad-hoc and …. 15 cites.
  365. Sapc: a secure aggregation protocol for cluster-based wireless sensor networks“. C Bekara, M Laurent-Maknavicius, K Bekara. 2007. Springer International Conference on …. 15 cites.
  366. Scalable certificate revocation schemes for smart grid ami networks using bloom filters“. K Rabieh, MMEA Mahmoud, K Akkaya…. 2017. IEEE Transactions on …. 15 cites.
  367. Single-layer fractal hash chain traversal with almost optimal complexity“. DH Yum, JW Seo, S Eom, PJ Lee. 2009. Springer Cryptographers’ Track at the RSA …. 15 cites.
  368. Super-efficient aggregating history-independent persistent authenticated dictionaries“. SA Crosby, DS Wallach. 2009. Springer European Symposium on Research in Computer …. 15 cites.
  369. Techniques to audit and certify the long-term integrity of digital archives“. S Song, J JaJa. 2009. Springer International Journal on Digital Libraries. 15 cites.
  370. Versum: Verifiable computations over large public logs“. J van den Hooff, MF Kaashoek…. 2014. Proceedings of the 2014 …. 15 cites.
  371. A practical voting scheme with receipts“. M Klonowski, M Kutylowski, A Lauks, F Zagórski. 2005. Springer ISC. 14 cites.
  372. An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees“. F Coelho. 2008. Springer Lecture Notes in Computer Science. 14 cites.
  373. Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession“. E Esiner, A Küpçü, Ö Özkasap. 2014. Springer International Conference on Intelligent …. 14 cites.
  374. Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.“. A Buldas, M Niitsoo. 2010. Springer ACISP. 14 cites.
  375. Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Networks-A Review“. NP John, A Thomas. 2012. International Journal of Innovative Research and …. 14 cites.
  376. Privacy-preserving verification of aggregate queries on outsourced databases“. S Haber, W Horne, T Sander, D Yao. 2006. . 14 cites.
  377. Providing authentication and integrity in outsourced databases using Merkle hash trees“. E Mykletun, M Narasimha…. 2003. UCI-SCONCE …. 14 cites.
  378. Securing JPEG2000 code-streams“. RH Deng, Y Wu, D Ma. 2005. Springer Computer Security in the 21st Century. 14 cites.
  379. A contract-based accountability service model“. C Wang, S Chen, J Zic. 2009. Web Services, 2009. ICWS 2009. IEEE …. 13 cites.
  380. A trusted infrastructure for p2p-based marketplaces“. TTA Dinh, T Chothia, M Ryan. 2009. Peer-to-Peer Computing, 2009 …. 13 cites.
  381. Black-box non-black-box zero knowledge“. V Goyal, R Ostrovsky, A Scafuro, I Visconti. 2014. Proceedings of the forty …. 13 cites.
  382. Content discovery and transfer between mobile communications nodes“. GF O’shea, TC Zahn, A Rowstron. 2012. Google Patents US Patent 8,103,718. 13 cites.
  383. Hey, NSA: Stay away from my market! Future proofing app markets against powerful attackers“. S Fahl, S Dechand, H Perl, F Fischer, J Smrcek…. 2014. Proceedings of the …. 13 cites.
  384. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things“. YB Saied, A Olivereau. 2012. Communications and Networking …. 13 cites.
  385. Making secure processors os-and performance-friendly“. S Chhabra, B Rogers, Y Solihin…. 2009. ACM Transactions on …. 13 cites.
  386. Merkle tree authentication in UDDI registries“. E Bertino, B Carminati, E Ferrari. 2004. International Journal of Web …. 13 cites.
  387. One-time signatures revisited: Practical fast signatures using fractal merkle tree traversal“. D Naor, A Shenhav, A Wool. 2006. Electrical and Electronics …. 13 cites.
  388. Reliable hash trees for post-quantum stateless cryptographic hash-based signatures“. M Mozaffari-Kermani…. 2015. Defect and Fault …. 13 cites.
  389. Scalable trusted online dissemination of JPEG2000 images“. RH Deng, D Ma, W Shao, Y Wu. 2005. Springer Multimedia Systems. 13 cites.
  390. State management for hash-based signatures“. D McGrew, P Kampanakis, S Fluhrer…. 2016. Springer Security Standardisation …. 13 cites.
  391. An enhanced distributed weighted clustering routing protocol for key management“. K Gomathi, B Parvathavarthini. 2015. Indian Journal of Science and Technology. 12 cites.
  392. Authenticated storage using small trusted hardware“. HJ Yang, V Costan, N Zeldovich…. 2013. Proceedings of the 2013 …. 12 cites.
  393. Efficient content authentication over distributed hash tables“. R Tamassia, N Triandopoulos. 2005. Proc. Int’l Conf. Applied Cryptography …. 12 cites.
  394. Formal verification of smart contracts: Short paper“. K Bhargavan, A Delignat-Lavaud, C Fournet…. 2016. Proceedings of the …. 12 cites.
  395. Optimized hash tree for authentication in sensor networks“. V Kondratieva, SW Seo. 2007. IEEE communications letters. 12 cites.
  396. PIF: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks“. K Zhang, X Liang, R Lu, X Shen. 2015. IEEE Transactions on …. 12 cites.
  397. Proof of ownership in deduplicated cloud storage with mobile device efficiency“. CM Yu, CY Chen, HC Chao. 2015. IEEE Network. 12 cites.
  398. The bitcoin lightning network“. J Poon, T Dryja. 2015. . 12 cites.
  399. Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks“. HT Pai, J Deng, YS Han. 2010. Elsevier Computer communications. 12 cites.
  400. Trustworthy data from untrusted databases“. R Jain, S Prabhakar. 2013. Data Engineering (ICDE), 2013 IEEE …. 12 cites.
  401. Wormhole attack prevention mechanism for RPL based LLN network“. FI Khan, T Shon, T Lee, K Kim. 2013. Ubiquitous and Future …. 12 cites.
  402. A practical authentication scheme for in-network programming in wireless sensor networks“. I Krontiris, T Dimitriou. 2006. Proceedings of the 2nd ACM Workshop on …. 11 cites.
  403. A secure and efficient audit mechanism for dynamic shared data in cloud storage“. O Kwon, D Koo, Y Shin, H Yoon. 2014. The Scientific World Journal. 11 cites.
  404. An efficient certificate revocation scheme for large-scale AMI networks“. M Mahmoud, K Akkaya, K Rabieh…. 2014. … (IPCCC), 2014 IEEE …. 11 cites.
  405. An efficient PKC-based security architecture for wireless sensor networks“. MM Haque, ASK Pathan, BG Choi…. 2007. … , 2007. MILCOM 2007 …. 11 cites.
  406. Application of synchronous dynamic encryption system (SDES) in wireless sensor networks“. HS Soliman, M Omari. 2005. Proceedings of the 2nd ACM international …. 11 cites.
  407. Authentic Time-Stamps for Archival Storage.“. A Oprea, KD Bowers. 2009. Springer ESORICS. 11 cites.
  408. Balloon: A forward-secure append-only persistent authenticated data structure“. T Pulls, R Peeters. 2015. Springer European Symposium on Research in Computer …. 11 cites.
  409. Computation, memory and bandwidth efficient distillation codes to mitigate dos in multicast“. R Di Pietro, S Chessa…. 2005. Security and Privacy for …. 11 cites.
  410. Faster hash-based signatures with bounded leakage“. T Eisenbarth, I Von Maurich, X Ye. 2013. Springer International Conference on Selected …. 11 cites.
  411. Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.“. M Rückert, M Schneider, D Schröder. 2010. Springer ACNS. 11 cites.
  412. Homomorphic payment addresses and the pay-to-contract protocol“. I Gerhardt, T Hanke. 2012. arXiv preprint arXiv:1212.3257. 11 cites.
  413. Joint authentication and quality of service provisioning in cooperative communication networks“. R Ramamoorthy, FR Yu, H Tang, P Mason…. 2012. Elsevier Computer …. 11 cites.
  414. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components.“. C Weinhold, H Härtig. 2011. USENIX Annual Technical Conference. 11 cites.
  415. Low latency solution for confidentiality and integrity checking in embedded systems with off-chip memory“. R Vaslin, G Gogniat, JP Diguet…. 2007. … -centric Socs 2007. 11 cites.
  416. Managing Integrity for Data Exchanged on the Web.“. G Miklau, D Suciu. 2005. WebDB. 11 cites.
  417. Merkle tree traversal techniques“. B Ederov. 2007. www-old.cdc.informatik.tu-darmstadt … Bachelor Thesis, Darmstadt …. 11 cites.
  418. Mobile assisted key distribution in wireless sensor networks“. B Tas, AS Tosun. 2011. … ICC), 2011 IEEE International Conference on. 11 cites.
  419. Post-quantum cryptography: lattice signatures“. J Buchmann, R Lindner, M Rückert, M Schneider. 2009. Springer Computing. 11 cites.
  420. Reliable broadcast message authentication in wireless sensor networks“. T Yao, S Fukunaga, T Nakai. 2006. Springer Emerging Directions in Embedded and …. 11 cites.
  421. Tree-formed verification data for trusted platforms“. AU Schmidt, A Leicher, A Brett, Y Shah, I Cha. 2013. Elsevier Computers & Security. 11 cites.
  422. Universally composable anonymous Hash certification model“. F Zhang, JF Ma, SJ Moon. 2007. Springer Science in China Series F: Information …. 11 cites.
  423. Bitcoin Developer Reference“. K Okupski. 2014. Availabl e at http://enetium. com/resources/Bitcoin. pdf. 10 cites.
  424. Certificate Transparency“. A Langley, E Kasper, B Laurie. 2013. . 10 cites.
  425. Corslet: A shared storage system keeping your data private“. W Xue, JW Shu, Y Liu, M Xue. 2011. Springer Science China Information Sciences. 10 cites.
  426. Distributed access control for xml document centric collaborations“. MA Rahaman, Y Roudier…. 2008. … Conference, 2008. EDOC’ …. 10 cites.
  427. Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost“. Z Hu, P Mohassel, M Rosulek. 2015. Springer Annual Cryptology Conference. 10 cites.
  428. End-to-end secure delivery of scalable video streams“. K Mokhtarian, M Hefeeda. 2009. … of the 18th international workshop on …. 10 cites.
  429. Fault detection architectures for post-quantum cryptographic stateless hash-based secure signatures benchmarked on ASIC“. M Mozaffari-Kermani, R Azarderakhsh…. 2016. ACM Transactions on …. 10 cites.
  430. New realizations of somewhere statistically binding hashing and positional accumulators“. T Okamoto, K Pietrzak, B Waters, D Wichs. 2015. Springer International Conference on …. 10 cites.
  431. On deletion of outsourced data in cloud computing“. Z Mo, Q Xiao, Y Zhou, S Chen. 2014. Cloud Computing (CLOUD) …. 10 cites.
  432. On the scalability of an efficient “Nonscalable” key distribution scheme“. M Ramkumar. 2008. World of Wireless, Mobile and Multimedia …. 10 cites.
  433. Providing privacy-aware incentives in mobile sensing systems“. Q Li, G Cao. 2016. IEEE Transactions on Mobile Computing. 10 cites.
  434. Scalable Anonymous Communication with Provable Security.“. P Mittal, N Borisov, C Troncoso, A Rial, IKU Leuven. 2010. HotSec. 10 cites.
  435. Scalable authentication and key management in SCADA“. L Xiao, IL Yen, F Bastani. 2010. Parallel and Distributed Systems …. 10 cites.
  436. Secure and efficient authentication in wireless mesh networks using merkle trees“. L Santhanam, B Xie, DP Agrawal. 2008. Local Computer Networks …. 10 cites.
  437. Space savings and design considerations in variable length deduplication“. G Appaji Nag Yasa, PC Nagesh. 2012. ACM SIGOPS Operating Systems …. 10 cites.
  438. System-level security for network processors with hardware monitors“. K Hu, T Wolf, T Teixeira, R Tessier. 2014. Proceedings of the 51st Annual …. 10 cites.
  439. Towards a more democratic mining in bitcoins“. G Paul, P Sarkar, S Mukherjee. 2014. Springer International Conference on Information …. 10 cites.
  440. Verifiably Encrypted Signatures from RSA without NIZKs.“. M Rückert. 2009. Springer INDOCRYPT. 10 cites.
  441. 基于分级 Merkle 树的无线传感器网络广播认证策略“. 蒋毅, 史浩山, 赵洪钢. 2007. 系統仿真學報. 10 cites.
  442. A Blockchain-Based Approach to Health Information Exchange Networks“. K Peterson, R Deeduvanu, P Kanjamala, K Boles. 2016. . 9 cites.
  443. A fast real-time memory authentication protocol“. Y Hu, G Hammouri, B Sunar. 2008. Proceedings of the 3rd ACM workshop on …. 9 cites.
  444. A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications“. N Kaaniche, E El Moustaine…. 2014. Cluster, Cloud and Grid …. 9 cites.
  445. Accountable privacy for decentralized anonymous payments“. C Garman, M Green, I Miers. 2016. Springer … on Financial Cryptography and Data Security. 9 cites.
  446. An Analysis of Secure Processor Architectures.“. S Chhabra, Y Solihin, R Lal, M Hoekstra. 2010. Springer Trans. Computational Science. 9 cites.
  447. An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage.“. Y Xia, F Xia, X Liu, X Sun, Y Liu, Y Ge. 2014. KSII Transactions on Internet & …. 9 cites.
  448. Analysis of a proposed hash-based signature standard“. J Katz. 2016. Springer Security Standardisation Research. 9 cites.
  449. Authenticated and persistent skip graph: a data structure for cloud based data-centric applications“. TP Shabeera, P Chandran, SD Kumar. 2012. Proceedings of the International …. 9 cites.
  450. Authentication of moving range queries“. D Yung, E Lo, ML Yiu. 2012. Proceedings of the 21st ACM international …. 9 cites.
  451. Bitcoin clients“. R Skudnov. 2012. . 9 cites.
  452. Cryptographic hashing for virus localization“. G Di Crescenzo, F Vakil. 2006. Proceedings of the 4th ACM workshop on …. 9 cites.
  453. CryptoPage: Support matériel pour cryptoprocessus“. G Duc, R Keryell, C Lauradoux. 2005. Lavoisier TSI. Technique et science informatiques. 9 cites.
  454. Customer-centric energy usage data management and sharing in smart grid systems“. G Lahoti, D Mashima, WP Chen. 2013. Proceedings of the first ACM workshop …. 9 cites.
  455. Data integrity proof and secure computation in cloud computing“. V Ponnuramu, L Tamilselvan. 2012. Citeseer Journal of Computer Science. 9 cites.
  456. Datacube: A P2P persistent data storage architecture based on hybrid redundancy schema“. HB Ribeiro, E Anceaume. 2010. Parallel, Distributed and Network …. 9 cites.
  457. Efficient code-based one-time signature from automorphism groups with syndrome compatibility“. P Gaborit, J Schrek. 2012. Information Theory Proceedings (ISIT) …. 9 cites.
  458. EthIKS: Using Ethereum to audit a CONIKS key transparency log“. J Bonneau. 2016. Springer … Conference on Financial Cryptography and Data …. 9 cites.
  459. iBigTable: practical data integrity for bigtable in public cloud“. W Wei, T Yu, R Xue. 2013. Proceedings of the third ACM conference on Data …. 9 cites.
  460. Keychain-based signatures for securing BGP“. H Yin, B Sheng, H Wang, J Pan. 2010. IEEE Journal on Selected …. 9 cites.
  461. Lite-CA based key pre-distribution scheme in wireless sensor network“. Y Pan, L WANG, Z CAO, J Li. 2009. Journal on Communications. 9 cites.
  462. Method and apparatus for tamper-proof wirte-once-read-many computer storage“. R Sion. 2008. Google Patents US Patent App. 12/598,726. 9 cites.
  463. Multimedia content authentication for proxy-side adaptation“. AR Kaced, JC Moissinac. 2006. Digital Telecommunications,, 2006 …. 9 cites.
  464. Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment“. Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu…. 2013. Proceedings of the ACM …. 9 cites.
  465. On the synchronization bottleneck of OpenStack Swift-like cloud storage systems“. TT Chekam, E Zhai, Z Li, Y Cui…. 2016. … , IEEE INFOCOM 2016 …. 9 cites.
  466. One-time proxy signatures revisited“. K Bicakci. 2007. Elsevier Computer Standards & Interfaces. 9 cites.
  467. Outsourcing multi-version key-value stores with verifiable data freshness“. Y Tang, T Wang, X Hu, R Sailer, L Liu…. 2014. … (ICDE), 2014 IEEE …. 9 cites.
  468. Paser: Secure and efficient routing approach for airborne mesh networks“. M Sbeiti, N Goddemeier, D Behnke…. 2016. IEEE Transactions on …. 9 cites.
  469. SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks“. K Zhang, X Liang, R Lu, XS Shen. 2013. … (ICC), 2013 IEEE …. 9 cites.
  470. Secure and reliable distributed health records: achieving query assurance across repositories of encrypted health data“. A Clarke, R Steele. 2012. System Science (HICSS), 2012 45th …. 9 cites.
  471. Security Properties of Domain Extenders for Cryptographic Hash Functions.“. E Andreeva, B Mennink, B Preneel. 2010. JIPS. 9 cites.
  472. Smart grid mesh network security using dynamic key distribution with merkle tree 4-way handshaking“. B Hu, H Gharavi. 2014. IEEE Transactions on Smart Grid. 9 cites.
  473. System and method for fast and scalable multimedia authentication in real time environment“. C Chong, K Chow, H Chung, C Hui, K Yu…. 2006. Google Patents US Patent App. 11 …. 9 cites.
  474. Taking authenticated range queries to arbitrary dimensions“. D Papadopoulos, S Papadopoulos…. 2014. Proceedings of the 2014 …. 9 cites.
  475. The phish-market protocol: securely sharing attack data between competitors“. T Moran, T Moore. 2010. Springer Financial Cryptography and Data Security. 9 cites.
  476. The reduced address space (ras) for application memory authentication“. D Champagne, R Elbaz, RB Lee. 2008. Springer International Conference on Information …. 9 cites.
  477. VeriStream–a framework for verifiable data streaming“. D Schöder, M Simkin. 2015. Springer … Conference on Financial Cryptography and Data …. 9 cites.
  478. WebTrust–A comprehensive authenticity and integrity framework for HTTP“. M Backes, RW Gerling, S Gerling, S Nürnberger…. 2014. Springer … Conference on Applied …. 9 cites.
  479. A one-time signature using run-length encoding“. R Steinwandt, VI Villányi. 2008. Elsevier Information Processing Letters. 8 cites.
  480. A security plane for publish/subscribe based content oriented networks“. W Wong, F Verdi, MF Magalhães. 2008. Proceedings of the 2008 ACM …. 8 cites.
  481. AFS: privacy-preserving public auditing with data freshness in the cloud“. P Maheswari, B Sindhumathi. 0. … of Computer Engineering (IOSRJCE) e-ISSN. 8 cites.
  482. Auditable privacy: On tamper-evident mix networks“. JY Choi, P Golle, M Jakobsson. 2006. Springer Financial Cryptography. 8 cites.
  483. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment“. B Lee, JH Lee. 2017. Springer The Journal of Supercomputing. 8 cites.
  484. Certificate Transparency v2. 1a“. B Laurie, E Kasper. 2012. Links. org, September. 8 cites.
  485. Content discovery and transfer between mobile communications nodes“. GF O’shea, TC Zahn, A Rowstron. 2013. Google Patents US Patent 8,402,087. 8 cites.
  486. Cryptocash, cryptocurrencies, and cryptocontracts“. N Koblitz, AJ Menezes. 2016. Springer Designs, Codes and Cryptography. 8 cites.
  487. Cryptography for parallel RAM from indistinguishability obfuscation“. YC Chen, SSM Chow, KM Chung, RWF Lai…. 2016. Proceedings of the …. 8 cites.
  488. Data security, privacy, availability and integrity in cloud computing: issues and current solutions“. S Aldossary, W Allen. 2016. Int. J. Adv. Comput. Sci. Appl. 8 cites.
  489. Data security, privacy, availability and integrity in cloud computing: issues and current solutions“. S Aldossary, W Allen. 2016. Int. J. Adv. Comput. Sci. Appl. 8 cites.
  490. Data syncing in a distributed system“. J Cantwell, W Minckler, J Roback…. 2015. Google Patents US Patent App. 14 …. 8 cites.
  491. Does secure time-stamping imply collision-free hash functions?“. A Buldas, A Jürgenson. 2007. Springer Provable Security. 8 cites.
  492. Efficient message authentication protocol for WSN“. MS Rosales, GG Garcia, GD Sanchez. 2009. WSEAS Transactions on …. 8 cites.
  493. Ensuring dynamic data integrity with public auditability for cloud storage“. L Chen, H Chen. 2012. Computer Science & Service System (CSSS) …. 8 cites.
  494. eRIPP‐FS: Enforcing privacy and security in RFID“. M Conti, R Di Pietro, LV Mancini…. 2010. Wiley Online Library Security and …. 8 cites.
  495. How traveling salespersons prove their identity“. S Lucks. 1995. Springer Cryptography and Coding. 8 cites.
  496. Instant revocation“. JA Solworth. 2008. Springer European Public Key Infrastructure Workshop. 8 cites.
  497. Inversion of a recursive tree traversal“. JLA Van de Snepscheut. 1991. Elsevier Information processing letters. 8 cites.
  498. Research on Secure Routing Protocols in Wireless Sensor Networks [J]“. D WU, G HU, G NI, W LI, Z ZHANG. 2008. Chinese Journal of Sensors and …. 8 cites.
  499. Signature System and Signature Method“. C Vuillaume, K Okeya, M Yoshino. 2007. Google Patents US Patent App. 11/848,386. 8 cites.
  500. System and method for efficient trust preservation in data stores“. T Li, X Ma. 2009. Google Patents US Patent App. 12/388,422. 8 cites.
  501. A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.“. C Castelluccia, S Jarecki, J Kim, G Tsudik. 2004. Springer SCN. 7 cites.
  502. A short redactable signature scheme using pairing“. S Lim, E Lee, CM Park. 2012. Wiley Online Library Security and Communication …. 7 cites.
  503. Dynamic Merkle trees for verifying privileges in sensor networks“. L Zhou, CV Ravishankar. 2006. Communications, 2006. ICC’06 …. 7 cites.
  504. Efficient public key authentication in MANET“. VR Ghorpade, YV Joshi, RR Manthalkar. 2009. Proceedings of the …. 7 cites.
  505. Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems“. Z Mo, Y Zhou, S Chen, C Xu. 2014. Cloud Computing (CLOUD) …. 7 cites.
  506. Enabling public verifiability and availability for secure data storage in cloud computing“. RM Jogdand, RH Goudar, GB Sayed, PB Dhamanekar. 2015. Springer Evolving Systems. 7 cites.
  507. Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network.“. SY Lim, MH Lim. 2011. JUSPN. 7 cites.
  508. Explicit proxies for HTTP/2.0“. R Peon. 2012. . 7 cites.
  509. Fast secure communications in shared memory multiprocessor systems“. M Lee, M Ahn, EJ Kim. 2011. IEEE Transactions on Parallel and …. 7 cites.
  510. Going beyond pollution attacks: Forcing byzantine clients to code correctly“. RA Popa, A Chiesa, T Badirkhanli…. 2011. arXiv preprint arXiv …. 7 cites.
  511. Homomorphic Signatures for Digital Photographs.“. R Johnson, L Walsh, M Lamb. 2011. Springer Financial Cryptography. 7 cites.
  512. Integrity verification of outsourced frequent itemset mining with deterministic guarantee“. B Dong, R Liu, WH Wang. 2013. Data Mining (ICDM), 2013 IEEE …. 7 cites.
  513. Joint pollution detection and attacker identification in peer-to-peer live streaming“. B Hu, HV Zhao. 2010. … and Signal Processing (ICASSP), 2010 IEEE …. 7 cites.
  514. MAC precomputation with applications to secure memory“. J Garay, V Kolesnikov, R McLellan. 2009. Springer International Conference on …. 7 cites.
  515. Microcredits for verifiable foreign service provider metering“. C Gentry, Z Ramzan. 2004. Springer Financial Cryptography. 7 cites.
  516. Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity“. S Haber, WG Horne, T Sander…. 2009. Privacy enhancing …. 7 cites.
  517. Privacy-preserving participatory sensing“. Q Li, G Cao. 2015. IEEE Communications Magazine. 7 cites.
  518. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability“. X Liang, S Shetty, D Tosh, C Kamhoua…. 2017. Proceedings of the 17th …. 7 cites.
  519. Secure and DoS-resistant network reprogramming in sensor networks based on CPK“. Y Zhang, XS Zhou, YM Ji, ZY Fang…. 2008. … Networking and Mobile …. 7 cites.
  520. SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks“. AR Kaced, JC Moissinac. 2006. Internet Surveillance and Protection …. 7 cites.
  521. Symmetric Cryptographic Protocols“. M Ramkumar. 2014. . 7 cites.
  522. Towards integrating key distribution with entity authentication for efficient, scalable and secure group communication in MANETs“. M Striki, JS Baras. 2004. Communications, 2004 IEEE International …. 7 cites.
  523. Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis“. I Alqassem, D Svetinovic. 2014. … IEEE and Cyber, Physical and Social …. 7 cites.
  524. 一种云存储环境下的安全存储系统“. 薛矛, 薛巍, 舒继武, 刘洋. 2015. 计算机学报. 7 cites.
  525. A light weight security scheme for HWMP protocol using Elliptic Curve technique“. J Ben-Othman, YIS Benitez. 2011. Local Computer Networks (LCN) …. 6 cites.
  526. A privacy-preserving reauthentication scheme for mobile wireless sensor networks“. S Jiang, J Zhang, JJ Miao…. 2013. International Journal of …. 6 cites.
  527. An efficient scheme for removing compromised sensor nodes from wireless sensor networks“. Y Wang, B Ramamurthy, X Zou…. 2010. Wiley Online Library Security and …. 6 cites.
  528. An Efficient TCB for a Generic Data Dissemination System“. A Velagapalli, S Mohanty…. 2012. … on Communications in …. 6 cites.
  529. Authentication mechanism on wireless sensor networks: A survey“. P Guo, J Wang, J Zhu, Y Cheng. 2013. Proceedings of the 2nd …. 6 cites.
  530. Combined authentication and quality of service in cooperative communication networks“. R Ramamoorthy, FR Yu, H Tang…. 2010. … Computing (EUC), 2010 …. 6 cites.
  531. Databank: An economics based privacy preserving system for distributing relevant advertising and content“. RM Lukose, M Lillibridge. 2006. . 6 cites.
  532. Efficient Quantum-Immune Keyless Signatures with Identity.“. A Buldas, R Laanoja, A Truu. 2014. IACR Cryptology ePrint …. 6 cites.
  533. Extending existing blockchains with virtualchain“. J Nelson, M Ali, R Shea…. 2016. Workshop on Distributed …. 6 cites.
  534. Fuzzy trust model for wireless sensor networks with intrusion tolerance“. L Wang, YB Guo, Y Zhan. 2010. Journal on Communications. 6 cites.
  535. Graphene-SGX: A practical library OS for unmodified applications on SGX“. CC Tsai, DE Porter, M Vij. 2017. 2017 USENIX Annual Technical Conference …. 6 cites.
  536. Hashing scheme for space-efficient detection and localization of changes in large data sets“. V Kontak, S Srbljić, D Škvorc. 2012. MIPRO, 2012 Proceedings of the …. 6 cites.
  537. Integrity verification of outsourced XML databases“. R Liu, H Wang. 2009. … Science and Engineering, 2009. CSE’09 …. 6 cites.
  538. Laconic oblivious transfer and its applications“. C Cho, N Döttling, S Garg, D Gupta, P Miao…. 2017. Springer Annual International …. 6 cites.
  539. Proofs of ownership and retrievability in cloud storage“. R Du, L Deng, J Chen, K He…. 2014. Trust, Security and …. 6 cites.
  540. Proofs of Space-Time and Rational Proofs of Storage.“. T Moran, I Orlov. 2016. IACR Cryptology ePrint Archive. 6 cites.
  541. QuasiModo: More Efficient Hash Tree-Based Certificate Revocation“. F Elwailly, Z Ramzan. 2003. Sep. 6 cites.
  542. SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains“. A Dvir, L Buttyan, TV Thong. 2013. Communications (ICC), 2013 …. 6 cites.
  543. Secure Block Device–Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems“. D Hein, J Winter, A Fitzek. 2015. Trustcom/BigDataSE/ISPA, 2015 …. 6 cites.
  544. Securing BGP through keychain-based signatures“. H Yin, B Sheng, H Wang, J Pan. 2007. Quality of Service, 2007 …. 6 cites.
  545. Seluge++: A secure over-the-air programming scheme in wireless sensor networks“. F Doroodgar, MA Razzaque, IF Isnin. 2014. Sensors. 6 cites.
  546. Slow but certain wins the race: authenticated bundle communication in delay tolerant networks“. W Itani, A Tajeddine, A Kayssi, A Chehab. 2010. … of the 6th ACM workshop on …. 6 cites.
  547. Three-property preserving iterations of keyless compression functions“. E Andreeva, G Neven, B Preneel…. 2007. ECRYPT Hash …. 6 cites.
  548. Tipping pennies? privately practical anonymous micropayments“. B Carbunar, Y Chen, R Sion. 2012. IEEE Transactions on …. 6 cites.
  549. Towards fast hardware memory integrity checking with skewed Merkle trees“. J Szefer, S Biedermann. 2014. Proceedings of the Third Workshop on …. 6 cites.
  550. Track me if you can: Transparent obfuscation for Location based Services“. R Di Pietro, R Mandati, NV Verde. 2013. World of Wireless, Mobile …. 6 cites.
  551. Trusted transport mode based cluster-Merkle-tree for wireless sensor networks“. Z Quan, F Gui, D Xiao, J Li. 2010. Computer Application and System …. 6 cites.
  552. Two-level verification of data integrity for data storage in cloud computing“. G Xu, C Chen, H Wang, Z Zang, M Pang…. 2011. Springer Advanced Research on …. 6 cites.
  553. A case for near data security“. A Gundu, AS Ardestani, M Shevgoor…. 2014. Proc. 2nd Workshop …. 5 cites.
  554. A fast hash tree generator for Merkle signature scheme“. A Shoufan, N Huber. 2010. Circuits and Systems (ISCAS) …. 5 cites.
  555. A Key management SchemeBased on One Way Function Clustered sensor networks“. L Min, YIN Jian-Ping, WU Yong-an. 2008. Journal of computer research …. 5 cites.
  556. A secure round-based timestamping scheme with absolute timestamps (short paper)“. DP Le, A Bonnecaze, A Gabillon. 2008. Springer International Conference on Information …. 5 cites.
  557. A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks“. ES Babu, C Nagaraju, MHM Prasad. 2015. Proceedings of the Sixth …. 5 cites.
  558. A space-and time-efficient Implementation of the Merkle Tree Traversal Algorithm“. M Knecht, W Meier, CU Nicola. 2014. arXiv preprint arXiv:1409.4081. 5 cites.
  559. A survey of microarchitecture support for embedded processor security“. AK Kanuparthi, R Karri, G Ormazabal…. 2012. VLSI (ISVLSI), 2012 …. 5 cites.
  560. Algebraic construction for zero-knowledge sets“. R Xue, NH Li, JT Li. 2008. Springer Journal of Computer Science and Technology. 5 cites.
  561. Amortized e-cash“. M Liskov, S Micali. 2001. Springer International Conference on Financial Cryptography. 5 cites.
  562. An Access Control Scheme in Wireless Sensor Networks“. S Yu-long, MA Jian-feng…. 2007. Network and Parallel …. 5 cites.
  563. An efficient and scalable quasi-aggregate signature scheme based on LFSR sequences“. S Chakrabarti, S Chandrasekhar…. 2009. … on Parallel and …. 5 cites.
  564. An efficient scheme for secure communication in large-scale wireless sensor networks“. Z Su, C Lin, F Ren, Y Jiang…. 2009. … and Mobile Computing …. 5 cites.
  565. An infrastructure for long-term archiving of authenticated and sensitive electronic documents“. TA Ramos, N Da Silva, LC Lung, JG Kohler…. 2010. Springer European Public Key …. 5 cites.
  566. Bitcoin-based fair payments for outsourcing computations of fog devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier Future Generation Computer …. 5 cites.
  567. Bivariate polynomials modulo composites and their applications“. D Boneh, H Corrigan-Gibbs. 2014. Springer International Conference on the Theory and …. 5 cites.
  568. Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.“. QQ Xie, S Jiang, L Wang, CC Chang. 2016. IJ Network Security. 5 cites.
  569. Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc networks“. L Sánchez-Casado, R Magán-Carrión…. 2014. Security for Multihop …. 5 cites.
  570. Digital currency mining circuitry“. M Pauker, N Drego, V Kheterpal…. 2014. Google Patents US Patent App. 14/252,613. 5 cites.
  571. Disclosing verifiable partial information of signed CDA documents using generalized redactable signatures“. D Slamanig, C Stingl. 2009. e-Health Networking, Applications and …. 5 cites.
  572. Distributed immutabilization of secure logs“. J Cucurull, J Puiggalí. 2016. Springer International Workshop on Security and Trust …. 5 cites.
  573. Distributed node revocation based on cooperative security“. O Garcia, H Baldus. 2007. Mobile Adhoc and Sensor Systems, 2007 …. 5 cites.
  574. Efficient distributed third-party data authentication for tree hierarchies“. H Yuan, MJ Atallah. 2008. … Computing Systems, 2008. ICDCS’08. The …. 5 cites.
  575. Efficient log authentication for forensic computing“. N Kawaguchi, N Obata, S Ueda…. 2005. … , 2005. IAW’05 …. 5 cites.
  576. Efficient Sparse Merkle Trees“. R Dahlberg, T Pulls, R Peeters. 2016. Springer Nordic Conference on Secure IT Systems. 5 cites.
  577. Faster file matching using GPGPUs“. D Mohan. 2010. . 5 cites.
  578. Fault-tolerant and secure networked storage“. MC Chan, JR Jiang, ST Huang. 2012. … Management (ICDIM), 2012 …. 5 cites.
  579. Helical entanglement codes: An efficient approach for designing robust distributed storage systems“. VE Galinanes, P Felber. 2013. Springer Symposium on Self-Stabilizing Systems. 5 cites.
  580. Hop: Hardware makes obfuscation practical“. K Nayak, C Fletcher, L Ren…. 2017. 24th Annual …. 5 cites.
  581. Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection“. G Duc, R Keryell. 2008. Springer Journal in Computer Virology. 5 cites.
  582. Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks [J]“. T YUAN, JQ MA, YP ZHONG, SY ZHANG. 2010. Journal of Software. 5 cites.
  583. Lightweight authentication of freshness in outsourced key-value stores“. Y Tang, T Wang, L Liu, X Hu, J Jang. 2014. Proceedings of the 30th Annual …. 5 cites.
  584. Method for distributed identification of a station in a network“. OG Morchon, B Erdmann, H Baldus. 2017. Google Patents US Patent 9,553,726. 5 cites.
  585. Method for distributing encryption means“. OG Morchon, MP Sillner, B Erdmann. 2014. Google Patents US Patent 8,837,736. 5 cites.
  586. Mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network“. S Jiang, J Miao, L Wang. 2011. Communication Software and …. 5 cites.
  587. On the key revocation schemes in wireless sensor networks“. D Mall, K Konaté, ASK Pathan. 2013. Green Computing and …. 5 cites.
  588. Performance and consistency improvements of hash tree based disk storage protection“. F Hou, D Gu, N Xiao, F Liu, H He. 2009. … , Architecture, and Storage …. 5 cites.
  589. Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage“. JR Bolannavar. 2014. International Journal of Scientific Engineering and …. 5 cites.
  590. Proof of space from stacked expanders“. L Ren, S Devadas. 2016. Springer Theory of Cryptography Conference. 5 cites.
  591. Publicly verifiable conjunctive keyword search in outsourced databases“. M Azraoui, K Elkhiyaoui, M Önen…. 2015. … and Network Security …. 5 cites.
  592. Redactable signature schemes for trees with signer-controlled non-leaf-redactions“. H de Meer, HC Pöhls, J Posegga, K Samelin. 2012. Springer International Conference on …. 5 cites.
  593. Secure logging schemes and Certificate Transparency“. B Dowling, F Günther, U Herath, D Stebila. 2016. Springer European Symposium on …. 5 cites.
  594. Secure routing protocol for hybrid wireless mesh network (HWMN)“. D Bansal, S Sofat, G Singh. 2010. Computer and Communication …. 5 cites.
  595. Security challenges and opportunities in adaptive and reconfigurable hardware“. V Costan, S Devadas. 2011. … Security and Trust (HOST), 2011 IEEE …. 5 cites.
  596. Shorter hash-based signatures“. GCCF Pereira, C Puodzius, PSLM Barreto. 2016. Elsevier Journal of Systems and …. 5 cites.
  597. Sia: Simple Decentralized Storage“. D Vorick, L Champine. 2014. . 5 cites.
  598. SinPack: A security protocol for preventing pollution attacks in network-coded content distribution networks“. W Itani, C Ghali, A El Hajj, A Kayssi…. 2010. … 2010), 2010 IEEE. 5 cites.
  599. Slightly improved merkle tree traversal for user authentication using pseudorandomly-generated leaves“. D Stebila. 2006. University of Waterloo, ON, Canada. 5 cites.
  600. SMART POOL: Practical Decentralized Pooled Mining.“. L Luu, Y Velner, J Teutsch…. 2017. IACR Cryptology ePrint …. 5 cites.
  601. State of The Art and Hot Aspects in Cloud Data Storage Security“. N Paladi, C Gehrmann, F Morenius. 2013. . 5 cites.
  602. System and method for verifying the integrity and completeness of records“. WWS Hsu, X Ma. 2009. Google Patents US Patent 7,606,795. 5 cites.
  603. The concept of secure processes for Linux on the CryptoPage/x86 secure architecture“. G Duc, R Keryell. 2005. 20th ACM Symposium on Operating Systems …. 5 cites.
  604. Threshold signature for distributed time stamping scheme“. A Bonnecaze, P Trebuchet. 2007. Springer Annals of telecommunications. 5 cites.
  605. Towards verifiable parallel content retrieval“. W Wong, MF Magalhäes…. 2010. … Protocols (NPSec), 2010 …. 5 cites.
  606. Updatable key management scheme with intrusion tolerance for unattended wireless sensor network“. L Wang, T Jiang, X Zhu. 2011. … Conference (GLOBECOM 2011) …. 5 cites.
  607. WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.“. T Li, X Ma, N Li. 2009. Springer ESORICS. 5 cites.
  608. … ‘an Communication College, Xi’an 710106, China); Strategy for Broadcast Authentication in Wireless Sensor Networks Based on Hierarchical Merkle Tree …“. Y JIANG, H SHI, H ZHAO. 2007. Journal of System Simulation. 4 cites.
  609. A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission“. A Katal, M Wazid, RH Goudar…. 2013. … Technologies (ICT), 2013 …. 4 cites.
  610. A cluster-based random key revocation protocol for wireless sensor networks“. Y Jiang, HS Shi. 2008. Journal of Electronic Science and Technology. 4 cites.
  611. A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications“. D Zheng, H Tang, FR Yu. 2012. … CONFERENCE, 2012-MILCOM …. 4 cites.
  612. A new encryption and hashing scheme for the security architecture for microprocessors“. J Platte, RD Díaz, E Naroska. 2006. Springer Communications and Multimedia Security. 4 cites.
  613. A Note on Traversing skew merkle trees“. M Karpiński, Y Nekritch. 2004. Inst. für Informatik . 4 cites.
  614. A position-aware Merkle tree for dynamic cloud data integrity verification“. J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu. 2017. Springer Soft Computing. 4 cites.
  615. A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid“. ACF Chan, J Zhou. 2015. IEEE Transactions on Intelligent …. 4 cites.
  616. An authentication protocol for sensor networks using pairings“. M Salinas, G Gallegos, G Duchén. 2009. … , and Computers, 2009 …. 4 cites.
  617. An Efficient Dynamic Proof of Retrievability Scheme“. Z Mo, Y Zhou, S Chen. 2013. ZTE Communications. 4 cites.
  618. An efficient post-quantum one-time signature scheme“. K Kalach, R Safavi-Naini. 2015. Springer International Conference on Selected Areas in …. 4 cites.
  619. Asynchronous large-scale certification based on certificate verification trees“. J Domingo-Ferrer, M Alba, F Sebé. 2001. Springer … and Multimedia Security Issues of the …. 4 cites.
  620. Authenticated index structures for outsourced databases“. F Li, M Hadjileftheriou, G Kollios, L Reyzin. 2008. Springer Handbook of Database …. 4 cites.
  621. Authentication of sensor network flooding based on neighborhood cooperation“. T Zhou, K Chakrabarty. 2006. Wireless Communications and …. 4 cites.
  622. Bringing secure Bitcoin transactions to your smartphone“. D Frey, MX Makkes, PL Roman, F Taïani…. 2016. Proceedings of the 15th …. 4 cites.
  623. Computing: Secure the internet“. B Laurie, C Doctorow. 2012. Nature. 4 cites.
  624. Cross and clean: Amortized garbled circuits with constant overhead“. JB Nielsen, C Orlandi. 2016. Springer Theory of Cryptography Conference. 4 cites.
  625. Decim: Detecting endpoint compromise in messaging“. J Yu, M Ryan, C Cremers. 2017. IEEE Transactions on Information …. 4 cites.
  626. DMSS-动态 Merkle 可信树签名方案“. 蔡永泉, 刘芳. 2009. 电子学报. 4 cites.
  627. Efficient asynchronous accumulators for distributed PKI“. L Reyzin, S Yakoubov. 2016. Springer … Conference on Security and Cryptography for …. 4 cites.
  628. Efficient broadcast authentication in wireless sensor networks“. Z Du, K Wang, L Zhou. 2008. Asia-Pacific Services Computing …. 4 cites.
  629. Efficient record-level keyless signatures for audit logs“. A Buldas, A Truu, R Laanoja, R Gerhards. 2014. Springer Nordic Conference on Secure …. 4 cites.
  630. Fern: An updatable authenticated dictionary suitable for distributed caching“. E Freudenthal, D Herrera, S Gutstein, R Spring…. 2007. Springer … Methods, Models, and …. 4 cites.
  631. Fighting mallory the insider: Strong write-once read-many storage assurances“. R Sion, Y Chen. 2012. IEEE Transactions on Information Forensics …. 4 cites.
  632. Formal verification of smart contracts“. K Bhargavan, A Delignat-Lavaud…. 2016. Proceedings of the …. 4 cites.
  633. From stateful hardware to resettable hardware using symmetric assumptions“. N Döttling, D Kraschewski, J Müller-Quade…. 2015. Springer … Conference on Provable …. 4 cites.
  634. High-performance qualified digital signatures for X-road“. A Ansper, A Buldas, M Freudenthal…. 2013. Springer Nordic Conference on …. 4 cites.
  635. IndexTree: An Efficient Tamper-Evidence Logging“. Y Bao, Y Wang, Z Luan, X Pei…. 2010. … (HPCC), 2010 12th IEEE …. 4 cites.
  636. Introduction“. DA Tran. 2012. Springer Data Storage for Social Networks. 4 cites.
  637. Ivec: off-chip memory integrity protection for both security and reliability“. R Huang, GE Suh. 2010. ACM SIGARCH Computer Architecture News. 4 cites.
  638. Key establishment between heterogenous nodes in wireless sensor and actor networks“. B Yu, J Ma, Z Wang, D Mao, C Gao. 2006. Springer Advanced Web and Network …. 4 cites.
  639. Light-weight, runtime verification of query sources“. T Ge, S Zdonik. 2009. Data Engineering, 2009. ICDE’09. IEEE 25th …. 4 cites.
  640. Minimal trusted computing base for MANET nodes“. V Thotakura, M Ramkumar. 2010. Wireless and Mobile Computing …. 4 cites.
  641. Optimization of Tree Modes for Parallel Hash Functions: A Case Study“. K Atighehchi, R Rolland. 2017. IEEE Transactions on Computers. 4 cites.
  642. Practical broadcast authentication protocol for sensor networks [J]“. Z DU, Y SHEN, J MA, L ZHOU. 2010. Journal of Xidian University. 4 cites.
  643. Proof of Space from Stacked Bipartite Graphs.“. L Ren, S Devadas. 2016. IACR Cryptology ePrint Archive. 4 cites.
  644. Proofs of Proofs of Work with Sublinear Complexity“. A Kiayias, N Lamprou, AP Stouka. 2016. Springer International Conference on Financial …. 4 cites.
  645. Public key signatures and lightweight security solutions in a wireless environment“. D Lagutin, S Tarkoma. 2009. Springer Smart Spaces and Next Generation Wired …. 4 cites.
  646. Public-key Primitives“. L Batina, S Seys, B Preneel…. 2008. Wireless sensor …. 4 cites.
  647. Realizing Digital Signatures with One-Way Hash Functions“. C Ruland. 1993. Taylor & Francis Cryptologia. 4 cites.
  648. Scalable Byzantine-Fault-Quantifying Clock Synchronization“. J Douceur, J Howell, JJD Douceur. 2003. . 4 cites.
  649. Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage“. D Koo, J Hur, H Yoon. 2014. Springer Frontier and Innovation in Future Computing and …. 4 cites.
  650. Secure disk with authenticated encryption and IV verification“. F Hou, N Xiao, F Liu, H He. 2009. … and Security, 2009. IAS’09. Fifth …. 4 cites.
  651. Secure program update using broadcast encryption for clustered wireless sensor networks“. MB Nirmala, AS Manjunath. 2010. Wireless Communication and …. 4 cites.
  652. Signtiming scheme based on aggregate signature“. DP Le, A Bonnecaze, A Gabillon. 2008. Intelligence and Security …. 4 cites.
  653. Strategy for broadcast au-thentication in wireless sensor networks based on hierarchical merkle tree“. J Yi, S Hao-shan, Z Hong-gang. 2007. Journal of System Simulation. 4 cites.
  654. The Evolution of Global Scale Filesystems for Scientific Software Distribution“. J Blomer, P Buncic, R Meusel, G Ganis…. 2015. Computing in Science …. 4 cites.
  655. Tradeoffs between jamming resilience and communication efficiency in key establishment“. D Slater, R Poovendran, P Tague, BJ Matt. 2009. ACM SIGMOBILE Mobile …. 4 cites.
  656. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm“. B Dong, R Liu, HW Wang. 2016. IEEE Transactions on Services …. 4 cites.
  657. Update-Optimal Authenticated Structures Based on Lattices.“. C Papamanthou, R Tamassia. 2010. IACR Cryptology ePrint Archive. 4 cites.
  658. A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks“. F Wang, Y Zhang, Y Xu, L Wu…. 2014. … (ICNC), 2014 International …. 3 cites.
  659. A Dynamic Public Auditing Security Scheme To Preserve Privacy In Cloud Storage“. BK Thomas, MN Rajkumar. 2013. IJSHJE . 3 cites.
  660. A multiple-MAC-based protocol to identify misbehaving nodes in network coding“. JC Corena, T Ohtsuki. 2012. Vehicular Technology Conference (VTC …. 3 cites.
  661. A multi-signature for time stamping scheme“. A Bonnecaze. 2006. … SAR/SSI. 3 cites.
  662. A new totally ordered timestamping scheme“. K Blibech, A Gabillon. 2006. 5th Conference on Security and Network …. 3 cites.
  663. A Node Revocation Scheme for Sensor Networks.“. PJ Chuang, TH Chao. 2006. Wireless and Optical Communications. 3 cites.
  664. A novel rekeying message authentication procedure based on Winternitz OTS and reconfigurable hardware architectures“. A Shoufan, SA Huss, O Kelm…. 2008. … Computing and FPGAs …. 3 cites.
  665. A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices“. T Kandappu, V Sivaraman…. 2012. Sensor, Mesh and Ad Hoc …. 3 cites.
  666. A proposal for mitigating multiple black-hole attack in wireless mesh networks“. O Shree, FJ Ogwu. 2013. Wireless Sensor Network. 3 cites.
  667. A Survey on the Key Management Schemes for Wireless Sensor Networks [J]“. M LI, J YIN, Y WU, J CHENG. 2008. Computer Engineering & Science. 3 cites.
  668. Adaptive security established on the requirements and resource abilities of network nodes“. F Samad, SA Makram. 2010. … (LCN), 2010 IEEE 35th Conference on. 3 cites.
  669. Addendum to scalable secure storage when half the system is faulty“. N Alon, H Kaplan, M Krivelevich, D Malkhi…. 2004. Information and …. 3 cites.
  670. An efficient authentication and simplified certificate status management for personal area networks“. C Sur, KH Rhee. 2006. Springer Asia-Pacific Network Operations and Management …. 3 cites.
  671. An efficient distributed currency“. B Laurie. 2011. Practice. 3 cites.
  672. An efficient group key agreement scheme for MANETs based on Merkle identity tree“. L Chen, R Hu. 2010. … (WCSE), 2010 Second World Congress on. 3 cites.
  673. An Efficient Trusted Computing Base (TCB) for a SCADA System Monitor“. A Velagapalli, M Ramkumar. 2011. submitted to the ACM/IEEE …. 3 cites.
  674. An efficient trusted computing base for MANET security“. SD Mohanty, V Thotakura…. 2014. Journal of Information …. 3 cites.
  675. An Improved Memory Integrity Protection Scheme.“. Y Hu, B Sunar. 2010. Springer TRUST. 3 cites.
  676. An optimized adaptive algorithm for authentication of safety critical messages in VANET“. A Smitha, MMM Pai, N Ajam…. 2013. … and Networking in China …. 3 cites.
  677. Authenticating email search results“. O Ohrimenko, H Reynolds, R Tamassia. 2012. Springer International Workshop on …. 3 cites.
  678. Authentication of reverse k nearest neighbor query“. G Li, C Luo, J Li. 2015. Springer International Conference on Database Systems for …. 3 cites.
  679. Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.“. MAG Vigil, D Cabarcas, A Wiesmaier…. 2012. IACR Cryptology ePrint …. 3 cites.
  680. Backing up your data to the cloud: Want to pay less?“. Y Zhu, J Masui. 2013. … ICPP), 2013 42nd International Conference on. 3 cites.
  681. Beacon certificate push revocation“. JA Solworth. 2008. Proceedings of the 2nd ACM workshop on Computer …. 3 cites.
  682. Behind the scenes of web services negotiation and agreement“. PCK Hung, LJ Zhang. 2004. Int J Web Serv Res (JWSR). 3 cites.
  683. Bitcoin and decentralized trust protocols“. R Pérez-Marco. 2016. arXiv preprint arXiv:1601.05254. 3 cites.
  684. Bitcoin protocol specification“. K Okupski. 0. 3 cites.
  685. Blockchain Electronic Vote“. P Noizat. 2015. Handbook of Digital Currency: Bitcoin, Innovation …. 3 cites.
  686. Broadcast authentication algorithm for wireless sensor networks“. XX Yao, XF Zheng, XW Zhou. 2010. Journal of China Institute of …. 3 cites.
  687. Broadcast authentication for resource constrained devices: A major pitfall and some solutions“. R Di Pietro, F Martinelli…. 2012. … Distributed Systems (SRDS …. 3 cites.
  688. C. Nicola,” A space-and timeefficient Implementation of the Merkle Tree Traversal Algorithm“. M Knecht, W Meier. 0. Computing Research Repository (CoRR). 3 cites.
  689. Cleaning up the PKI for long-term signatures“. MAG Vigil, RF Custódio…. 2012. www-old.cdc.informatik.tu-darmstadt … … e de Sistemas …. 3 cites.
  690. Cloud storage using merkle trees“. N Parab, A Brown. 2015. Google Patents US Patent App. 14/977,607. 3 cites.
  691. Communication Security: An Introduction to Cryptography“. S Vaudenay. 2004. Course notes. 3 cites.
  692. Decentralizing authorities into scalable strongest-link cothorities“. E Syta, I Tamas, D Visher…. 2015. CoRR, abs …. 3 cites.
  693. Defense against packet dropping attacks in opportunistic networks“. M Alajeely, R Doss. 2014. Advances in Computing …. 3 cites.
  694. Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks“. M Rameshkumar, CSG Dhass. 2012. International Journal of Advanced …. 3 cites.
  695. Efficient flexible batch signing techniques for imbalanced communication applications“. TY Youn, YH Park, T Kwon, S Kwon…. 2008. … on Information and …. 3 cites.
  696. Fawkescoin“. J Bonneau, A Miller. 2014. Springer Cambridge International Workshop on Security …. 3 cites.
  697. Guest editorial: Smart grid communications systems“. SL Kim, P Kitsos, M Nekovee, FR Yu…. 2014. IEEE Systems …. 3 cites.
  698. Hash Function Design Using Matrix Multiplication Ex-or Checksum Generation and Compression Technique Approach“. SG Srikantaswamy, HD Phaneendra. 2013. International Journal of Computer …. 3 cites.
  699. Implementation of a broadcast authentication mechanism in ZigBee“. JT Shieh, L chun Ko. 2006. The 2nd Workshop on Wireless, Ad …. 3 cites.
  700. Improved remote attestation mechanism based on group signatures and unbalanced Merkle hash tree“. D Fu, G Chen. 2013. JOURNAL OF INFORMATION &COMPUTATIONAL …. 3 cites.
  701. Improving smart grid security using Merkle Trees“. MC Muñoz, M Moh, TS Moh. 2014. Communications and Network …. 3 cites.
  702. Leveled group key management for wireless sensor networks“. L Fenghua, MJ WangWei. 2008. Chinese Journal of Electronics. 3 cites.
  703. Making bitcoin exchanges transparent“. C Decker, J Guthrie, J Seidel, R Wattenhofer. 2015. Springer European Symposium on …. 3 cites.
  704. Memory integrity protection method based on asymmetric hash tree“. M Haifeng, C Jie, G Zhenguo. 2014. Distributed Computing and …. 3 cites.
  705. Merkle tree traversal in log space and time (preprint, 2003)“. M Szydlo. 0. . 3 cites.
  706. Merkle tree traversal revisited. Manuscript, 2008“. J Buchmann, E Dahmen, M Schneider. 2008. . 3 cites.
  707. Method and apparatus for graph-based partition of cryptographic functionality“. BM Jakobsson, BS Kaliski Jr. 2010. Google Patents US Patent 7,730,518. 3 cites.
  708. Method and apparatus for secure and small credits for verifiable service provider metering“. CB Gentry, ZA Ramzan. 2010. Google Patents US Patent 7,783,579. 3 cites.
  709. Minimizing the TCB for securing SCADA systems“. A Velagapalli, M Ramkumar. 2011. … of the Seventh Annual Workshop on …. 3 cites.
  710. Modeling integrity in data exchange“. G Miklau, D Suciu. 2004. Springer Workshop on Secure Data Management. 3 cites.
  711. More on castor: the scalable secure routing protocol for ad-hoc networks“. W Galuba, P Papadimitratos, M Poturalski, K Aberer…. 2009. . 3 cites.
  712. Node cooperation and message authentication in trusted mobile ad hoc networks“. A Vijayakumar, K Selvamani. 2014. International Journal of Engineering …. 3 cites.
  713. On the performance and use of a space-efficient merkle tree traversal algorithm in real-time applications for wireless and sensor networks“. D Berbecaru, L Albertalli. 2008. Networking and Communications …. 3 cites.
  714. Optimized source authentication scheme for multicast based on Merkle Tree and TESLA“. Y Li, M Zhang, Y Guo, G Xu. 2010. Information Theory and …. 3 cites.
  715. Platform Integrity Attestation Based on Time [J]“. G XU, C CHANG, J HUANG, D GU. 2009. Computer Engineering. 3 cites.
  716. Privacy and integrity preserving skyline queries in tiered sensor networks“. J Li, Y Lin, G Wang, R Li, B Yin. 2014. Wiley Online Library Security and Communication …. 3 cites.
  717. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing“. D Koo, J Hur. 2018. Elsevier Future Generation Computer Systems. 3 cites.
  718. Random sampling key revocation scheme for distributed sensor networks“. Y Xue, H Jürgensen. 2009. Proceedings of the 2nd International Conference …. 3 cites.
  719. Real-world post-quantum digital signatures“. D Butin, SL Gazdag, J Buchmann. 2015. Springer Cyber Security and Privacy Forum. 3 cites.
  720. Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure“. N Emmadi, H Narumanchi. 2017. … of the 18th International Conference on …. 3 cites.
  721. Relating Boolean gate truth tables to one-way functions“. M Gomathisankaran, A Tyagi. 2009. Integrated Computer-Aided …. 3 cites.
  722. Relating Boolean gate truth tables to one-way functions“. M Gomathisankaran, A Tyagi. 2009. Integrated Computer-Aided …. 3 cites.
  723. Rolling boles, optimal XML structure integrity for updating operations“. S Graf, SK Belle, M Waldvogel. 2011. Proceedings of the 20th international …. 3 cites.
  724. Scalable and secure private set intersection for big data“. C Hahn, J Hur. 2016. Big Data and Smart Computing (BigComp) …. 3 cites.
  725. Secure distributed data storage in cloud computing“. Y Chen, WEIS KU, J Feng, P Liu…. 2011. … and Paradigms. John …. 3 cites.
  726. Secure Knowledge Management“. B Thuraisingham. 2004. Secure Knowledge Management …. 3 cites.
  727. Securing layer-2 path selection in wireless mesh networks“. MS Islam, MA Hamid, BG Choi, CS Hong. 2008. Springer International Workshop on …. 3 cites.
  728. Security of wireless sensor networks and analysis on efficient broadcast authentication“. M Rameshkumar, DCSG Dhass. 2012. International Journal of …. 3 cites.
  729. Survey of Privacy and Authentication Schemes for Ad Hoc Networks“. RL Hu, JW Liu, QS Zhang. 2007. Jisuanji Gongcheng/ Computer …. 3 cites.
  730. Time-stamping“. S Haber, H Massias. 2005. Springer Encyclopedia of Cryptography and Security. 3 cites.
  731. Trusted cvs“. M Venkitasubramaniam…. 2006. Data Engineering …. 3 cites.
  732. Using hash-based signatures to bootstrap quantum key distribution“. S Kunz-Jacques, P Jouguet. 2011. arXiv preprint arXiv:1109.2844. 3 cites.
  733. Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes.“. C Hanser, D Slamanig. 2013. Springer INDOCRYPT. 3 cites.
  734. XOR network coding pollution prevention without homomorphic functions“. JC Corena, A Basu, S Kiyomoto…. 2014. … (CCNC), 2014 IEEE …. 3 cites.
  735. Zcash Protocol Specification“. D Hopwood, S Bowe, T Hornby, N Wilcox. 2016. . 3 cites.
  736. 해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜“. 신기은, 최형기. 2009. 정보처리학회논문지 C, 제 16-C 권. 3 cites.
  737. A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016. IACR Cryptology ePrint …. 2 cites.
  738. A distributed time stamping scheme“. B Alexis, L Pierre, G Alban, B Kaouther. 2005. Research Report. 2 cites.
  739. A high efficiency protocol for reporting integrity measurements“. C Chaowen, H Rongyu, X Hui…. 2008. … Systems Design and …. 2 cites.
  740. A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks“. Y Jiang, R Zhang, X Du. 2013. Parallel and Distributed Computing …. 2 cites.
  741. A New Group Key Exchange Protocol Based on Zero-Knowledge Set“. S Haibo, L Dongdai, X Rui. 2006. Asian Journal of Information Technology. 2 cites.
  742. A novel cryptoprocessor architecture for chained Merkle signature scheme“. A Shoufan, N Huber, HG Molter. 2011. Elsevier Microprocessors and Microsystems. 2 cites.
  743. A performance boost for hash-based signatures“. T Eisenbarth, I von Maurich, C Paar, X Ye. 2013. Springer Number Theory and …. 2 cites.
  744. A query verification method for making outsourced databases trustworthy“. Y Zhou, C Wang. 2012. Services Computing (SCC), 2012 IEEE Ninth …. 2 cites.
  745. A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage“. NM Joseph, E Daniel, NA Vasanthi. 2013. International Journal of Advanced Research in …. 2 cites.
  746. A Secure Hardware Abstraction for Distributed Systems“. TTA Dinh, M Ryan. 2010. School of Computer Science … . 2 cites.
  747. A Secure Routing Protocol for Wireless Sensor Networks [J]“. C Wei-honga, X Wei-chub. 2008. Journal of Hunan City University …. 2 cites.
  748. A survey on distributed file system technology“. J Blomer. 2015. Journal of Physics: Conference Series. 2 cites.
  749. A Tamper-Detecting Implementation of Lisp.“. D Heimbigner. 2003. Security and Management. 2 cites.
  750. All about Eve: Execute-verify replication for multicore servers (extended version)“. M Kapritsos, Y Wang, V Quema, A Clement…. 2012. … Report TR-12-23, Department of … . 2 cites.
  751. An Efficient Approach for Merkle Tree Traversal“. X Tian, Y Peng, H Li, W Wei, Y Wang. 2012. JOURNAL OF INFORMATION …. 2 cites.
  752. An Efficient Scheme to Provide Real-time Memory Integrity Protection“. Y Hu. 2009. . 2 cites.
  753. An Efficient TCB for a Generic Content Distribution System“. SD Mohanty, A Velagapalli…. 2012. Cyber-Enabled …. 2 cites.
  754. An investigation of the Merkle signature scheme for cryptographically generated address signatures in mobile IPv6“. S Qadir, MU Siddiqi…. 2015. International Journal of …. 2 cites.
  755. Applied Cryptography“. J LIU, D REN, Y HU. 2008. Tsinghua University Press . 2 cites.
  756. Asymptotic analysis of plausible tree hash modes for sha-3“. K Atighehchi, A Bonnecaze. 2017. arXiv preprint arXiv:1708.05680. 2 cites.
  757. Authenticated Index Structures for Outsourced Database Systems“. F Li, M Hadjieleftheriou, G Kollios, L Reyzin. 2006. . 2 cites.
  758. Authentication schemes for VANETs: a survey“. A Das, D Roychoudhury…. 2013. … Journal of Vehicle …. 2 cites.
  759. Automated software configuration management“. J Whitney, I Carmel, S Yount. 2015. Google Patents US Patent App. 14/611,024. 2 cites.
  760. Bitcoin: An Empirical Study of Cryptocurrency“. E Rosen, E Wengrowski, GD Clark, X Gao. 2014. . 2 cites.
  761. Black Hole Attack in MANETs Preventions and Advancements: A Review“. K Kumar, TS Aulakh. 2016. International Journal of Computer …. 2 cites.
  762. Black Hole Attack in MANETs Preventions and Advancements: A Review“. K Kumar, TS Aulakh. 2016. International Journal of Computer …. 2 cites.
  763. Brief announcement: Distributed trust management and revocation“. D Kuptsov, A Gurtov, O Garcia-Morchon…. 2010. Proceedings of the 29th …. 2 cites.
  764. Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems“. F Hou, H He, N Xiao, F Liu. 2013. Elsevier Future Generation Computer Systems. 2 cites.
  765. C++ implementation of a hash-based digital signature scheme using fractal Merkle tree representation“. DF Coluccio. 2003. . 2 cites.
  766. Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?“. A Buldas, M Niitsoo. 2008. Springer International Conference on Provable Security. 2 cites.
  767. Counterexamples to hardness amplification beyond negligible“. Y Dodis, A Jain, T Moran, D Wichs. 2012. Springer Theory of Cryptography Conference. 2 cites.
  768. Cryptographic algorithms and protocols for security and privacy in wireless ad hoc networks“. S Seys. 2006. … University Leuven Secure Communications:’End-to …. 2 cites.
  769. Data Integrity and Message Authentication“. CH Gebotys. 2010. Springer Security in Embedded Devices. 2 cites.
  770. DDoS Attacks using P2P Networks“. P Kohli, U Ganugula. 2007. International Institute of Information …. 2 cites.
  771. Design of cross-layer security for wireless sensor network’s“. G YANG, C CHEN, M XIAO. 2007. Transducer and Microsystem …. 2 cites.
  772. Detection of wormhole attacks on IPv6 mobility-based wireless sensor network“. GH Lai. 2016. Springer EURASIP Journal on Wireless Communications and …. 2 cites.
  773. DMSS-Dynamic Merkle Authentication-tree Signature“. Y CAI, F LIU. 2009. Acta Electronica Sinica. 2 cites.
  774. Dynamic proofs of retrievability from Chameleon-Hashes“. S Rass. 2013. Security and Cryptography (SECRYPT), 2013 …. 2 cites.
  775. Dynamic remote attestation model in real-time monitoring [J]“. N Wang, ZQ Wu, XP Fu. 2011. Application Research of Computers. 2 cites.
  776. Efficient cloud computing with secure data storage using AES“. SP Jadhav, BR Nandwalkar. 2015. International Journal of …. 2 cites.
  777. Efficient Hash-Based Signatures on Embedded Devices“. S Rohde, T Eisenbarth…. 2008. SECSI-Secure …. 2 cites.
  778. Electronic Contract Signing Without Using Trusted Third Party“. Z Wan, RH Deng, D Lee. 2015. Springer … Conference on Network and System Security. 2 cites.
  779. Encryption scheme supporting secure in-network processing for WSNs“. YA Zhao, FB Wang, WJ Duan. 2007. Jisuanji Yingyong Yanjiu …. 2 cites.
  780. Encryption scheme supporting secure in-network processing for WSNs“. YA Zhao, FB Wang, WJ Duan. 2007. Jisuanji Yingyong Yanjiu …. 2 cites.
  781. Enhanced authentication for outsourced educational contents through provable block possession“. C Hahn, H Kwon, D Kim, J Hur. 2016. Springer Multimedia Tools and Applications. 2 cites.
  782. Ensuring dynamic data integrity based on variable block-size BLS in untrusted environment“. L Chen, W Song, S Yiu, W Luo. 2013. Advanced Institutes of Convergence … International …. 2 cites.
  783. FEDTIC: A security design for embedded systems with insecure external memory“. M Hong, H Guo. 2010. Springer Future Generation Information Technology. 2 cites.
  784. Fractal Merkle Tree representation and Traversal. Topics in Cryptology-CT-RSA 2003, 314–326“. M Jakobson, FT Leighton, S Micali, M Szydlo. 2003. Springer. 2 cites.
  785. Guaranteeing memory integrity in secure processors with Dynamic Trees“. S Khanvilkar. 0. ECE594–Advance computer architecture, Final …. 2 cites.
  786. High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems“. R Vaslin, G Gogniat, JP Diguet…. 2007. … on engineering of …. 2 cites.
  787. High throughput asynchronous algorithms for message authentication“. SA Crosby, DS Wallach. 2010. . 2 cites.
  788. High throughput asynchronous algorithms for message authentication“. SA Crosby, DS Wallach. 2010. . 2 cites.
  789. How to detect unauthorised usage of a key.“. J Yu, M Ryan, C Cremers. 2015. IACR Cryptology ePrint …. 2 cites.
  790. HTSS: Hash Tree Signature Scheme for Multicast Authentication“. K Balasubramanian, R Roopa. 2012. … Conference on Recent …. 2 cites.
  791. Implementation of an evidentiary record validation utility and security analysis for Surety’s AbsoluteProof“. M Thimblin, NSC Kamisetty, P Raman, A Paila. 2005. . 2 cites.
  792. Improving smart grid authentication using Merkle Trees“. MC Muñoz, M Moh, TS Moh. 2014. Parallel and Distributed Systems …. 2 cites.
  793. M. Schneider,” Merkle Tree Traversal Revisited“. J Buchmann, E Dahmen. 0. Lecture Notes in Computer Science. 2 cites.
  794. Merkle Hash tree based deduplication in cloud storage“. CL Li, Y Chen. 2014. Trans Tech Publ Applied Mechanics and Materials. 2 cites.
  795. Merkle tree of open transactions for lite mode? bitcointalk. org“. G Maxwell. 2011. June . 2 cites.
  796. Merkle Tree Patent“. R Merkle. 1979. US4309569A . 2 cites.
  797. Merkle tree reference counts“. R Ruef, K Everson, N Dalmatov, WC Biester. 2013. Google Patents US Patent 8,457,018. 2 cites.
  798. Merkle tree traversal in log space and time (preprint version), 2003“. M Szydlo. 2003. . 2 cites.
  799. Merkle tree traversal in log space and time. 2003“. M Szydlo. 0. Preprint, available at http://www. szydlo. com. 2 cites.
  800. Merkle trees“. B Carminati. 2009. Springer Encyclopedia of Database Systems. 2 cites.
  801. Message and its origin authentication protocol for data aggregation in sensor networks“. HK Lee, DH Nyang, JS Song. 2006. Springer International Conference on Embedded and …. 2 cites.
  802. Method Based on DCT transform to Resist Printing and Scanning Attack on Digital Seal [J]“. J SHI, J FAN. 2011. Modern Electronics Technique. 2 cites.
  803. Missive: Fast Application Launch From an Untrusted Buffer Cache.“. J Howell, J Elson, B Parno, JR Douceur. 2014. USENIX Annual Technical …. 2 cites.
  804. MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications“. Y Wang, Y Shen, H Wang, J Cao…. 2016. IEEE Transactions on …. 2 cites.
  805. NDN DeLorean: An authentication system for data