Practical verified computation with streaming interactive proofs

G Cormode, M Mitzenmacher, J Thaler - Proceedings of the 3rd …, 2012 - dl.acm.org
When delegating computation to a service provider, as in the cloud computing paradigm, we
seek some reassurance that the output is correct and complete. Yet recomputing the output …

Machine learning and BIM visualization for maintenance issue classification and enhanced data collection

JJ McArthur, N Shahbazi, R Fok, C Raghubar… - Advanced Engineering …, 2018 - Elsevier
Occupant-generated work orders are recognized as a good potential data to support Facility
Management (FM) activities, however they are unstructured and rarely contain the specific …

[PDF][PDF] 区块链与可信数据管理: 问题与方法

钱卫宁, 邵奇峰, 朱燕超, 金澈清, 周傲英 - 软件学报, 2017 - jos.org.cn
作为支撑比特币实现无中心高可信的账本管理的技术, 区块链在金融领域得到了广泛关注.
区块链实现了不完全可信环境中的可信数据管理, 具有去中心化, 防篡改, 不可抵赖 …

On spatio-temporal blockchain query processing

Q Qu, I Nurgaliev, M Muzammal, CS Jensen… - Future generation …, 2019 - Elsevier
Recent advances in blockchain technology suggest that the technology has potential for use
in applications in a variety of new domains including spatio-temporal data management. The …

An adaptive authenticated data structure with privacy-preserving for big data stream in cloud

Y Sun, Q Liu, X Chen, X Du - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
With the rapid development of 5G network, big data and IoT, data in many environments is
often continuously and dynamically generated with high growth rates, just like stream. Thus …

[图书][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

Authenticated join processing in outsourced databases

Y Yang, D Papadias, S Papadopoulos… - Proceedings of the 2009 …, 2009 - dl.acm.org
Database outsourcing requires that a query server constructs a proof of result correctness,
which can be verified by the client using the data owner's signature. Previous authentication …

Authenticated indexing for outsourced spatial databases

Y Yang, S Papadopoulos, D Papadias, G Kollios - The VLDB Journal, 2009 - Springer
In spatial database outsourcing, a data owner delegates its data management tasks to a
location-based service (LBS), which indexes the data with an authenticated data structure …

[HTML][HTML] A survey of set accumulators for blockchain systems

M Loporchio, A Bernasconi, DDF Maesa… - Computer Science Review, 2023 - Elsevier
Set accumulators are cryptographic primitives used to represent arbitrarily large sets of
elements with a single constant-size value and to efficiently verify whether a value belongs …

Authenticated data structures, generically

A Miller, M Hicks, J Katz, E Shi - ACM SIGPLAN Notices, 2014 - dl.acm.org
An authenticated data structure (ADS) is a data structure whose operations can be carried
out by an untrusted prover, the results of which a verifier can efficiently check as authentic …