Authenticated data structures are a model of computation where untrusted responders answer queries on a data structure on behalf of a trusted source and provide a proof of the validity of the answer to the user. We present a survey of techniques for designing authenticated data structures and overview their computational efficiency. We also discuss implementation issues and practical applications. © Springer-Verlag 2003.
CITATION STYLE
Tamassia, R. (2003). Authenticated data structures. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2832, 2–5. https://doi.org/10.1007/978-3-540-39658-1_2
Mendeley helps you to discover research relevant for your work.