Back to Results
First PageMeta Content
Computer programming / Tree traversal / Suffix tree / Pattern matching / Rope / XQuery / B-tree / Computing / Graph theory / Binary trees


Practical Authenticated Pattern Matching with Optimal Proof Size Dimitrios Papadopoulos Charalampos Papamanthou
Add to Reading List

Document Date: 2015-02-15 22:06:23


Open Document

File Size: 669,04 KB

Share Result on Facebook

Company

G1 / Enron / G2 / Creative Commons / /

/

Event

FDA Phase / /

Facility

library FLINT / DCLXVI library / University of Washington XML / /

IndustryTerm

authenticated pattern matching applications / setup algorithm / pattern matching applications / parallel algorithms / query processing / verification algorithm / search algorithm beings / main cryptogaphic tool / intrusion detection systems / verification algorithms / verifiable computation systems / data-processing problem / secure cloud services / benchmark tool / untrusted cloud server / databases allowing search / search algorithm / genkey algorithm / dataanalytics tool / authenticated pattern matching search / data-intensive applications / web search engines / keyword search authentication / natural language processing / verifiable computing / straightforward solution / parallel algorithm / correct processing / cloud computing / search time / cryptographic step-by-step processing / query-intensive applications / parallel accumulation setup algorithm / /

Organization

DBLP / Boston University University / University of Maryland / Brown University / University of Washington XML / VLDB Endowment / National Aeronautics and Space Administration / XMark / /

Person

Roberto Tamassia / Edward Tremel / /

Position

Prime Minister / rt / WB / author / book 0tle author YoP 0tle author / author YoP name salary name book 0tle author / /

Product

Our solution / /

ProgrammingLanguage

XPath / XML / C++ / /

ProvinceOrState

Maryland / Hawaii / /

Technology

XML / RAM / genkey algorithm / search algorithm / verification algorithms / setup algorithm / parallel algorithm / parallel accumulation setup algorithm / sDH / known parallel algorithms / 754 Algorithm / cryptography / natural language processing / public key / verification algorithm / DTD / document type definition / four algorithms / /

URL

http /

SocialTag