{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:38:02Z","timestamp":1761323882592},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,5,26]],"date-time":"2013-05-26T00:00:00Z","timestamp":1369526400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s10207-013-0198-5","type":"journal-article","created":{"date-parts":[[2013,5,25]],"date-time":"2013-05-25T07:34:49Z","timestamp":1369467289000},"page":"467-494","source":"Crossref","is-referenced-by-count":36,"title":["Privacy-preserving authentication of trees and graphs"],"prefix":"10.1007","volume":"12","author":[{"given":"Ashish","family":"Kundu","sequence":"first","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,26]]},"reference":[{"key":"198_CR1","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Zaharia, M.: Above the Clouds: A berkeley View of Cloud Computing. Tech. rep., University of California, Berkeley (2009)","DOI":"10.1145\/1721654.1721672"},{"key":"198_CR2","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Mehrotra, S., Iyer, B.: Providing database as a service. In: ICDE (2002)","DOI":"10.1109\/ICDE.2002.994695"},{"key":"198_CR3","doi-asserted-by":"crossref","unstructured":"Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, S.G.: Flexible authentication of XML documents. In: CCS (2001)","DOI":"10.1145\/501983.502003"},{"key":"198_CR4","doi-asserted-by":"crossref","unstructured":"Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39(1) (2004)","DOI":"10.1007\/s00453-003-1076-8"},{"key":"198_CR5","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Efficient authenticated data structures for graph connectivity and geometric search problems. In: Algorithmica, vol. Online (2009).","DOI":"10.1007\/s00453-009-9355-7"},{"key":"198_CR6","doi-asserted-by":"crossref","unstructured":"Papamanthou, C., Tamassia, R., Triandopoulos, N.: Authenticated hash tables. In: CCS (2008)","DOI":"10.1145\/1455770.1455826"},{"key":"198_CR7","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"198_CR8","doi-asserted-by":"crossref","unstructured":"Mouratidis, K., Sacharidis, D., Pang, H.: Partially materialized digest scheme: an efficient verification method for outsourced databases. VLDB J. 18(1) (2009)","DOI":"10.1007\/s00778-008-0108-z"},{"key":"198_CR9","unstructured":"Merkle, R.C.: A certified digital signature. In: CRYPTO (1989)"},{"key":"198_CR10","doi-asserted-by":"crossref","unstructured":"Atallah, M., Cho, Y., Kundu, A.: Efficient data authentication in an environment of untrusted third-party distributors. ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497478"},{"key":"198_CR11","doi-asserted-by":"crossref","unstructured":"Goel, S.K., Clifton, C., Rosenthal, A.: Derived access control specification for XML. In: XMLSEC (2003)","DOI":"10.1145\/968559.968561"},{"key":"198_CR12","unstructured":"Wang, H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted XML databases. In: VLDB (2006)"},{"key":"198_CR13","doi-asserted-by":"crossref","unstructured":"Ma, D., Deng, R.H., Pang, H., Zhou, J.: Authenticating query results in data publishing. In: ICICS (2005)","DOI":"10.1007\/11602897_32"},{"key":"198_CR14","doi-asserted-by":"crossref","unstructured":"Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. PVLDB 1(1) (2008)","DOI":"10.14778\/1453856.1453875"},{"key":"198_CR15","doi-asserted-by":"crossref","unstructured":"Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and authentic third-party distribution of XML documents. IEEE TKDE 16(10) (2004)","DOI":"10.1109\/TKDE.2004.63"},{"key":"198_CR16","unstructured":"Buldas, A., Laur, S.: Knowledge-binding commitments with applications in time-stamping. In: Public Key Cryptography (2007)"},{"key":"198_CR17","doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Security and inference in multilevel database and knowledge-base systems. SIGMOD Rec. 16(3) (1987)","DOI":"10.1145\/38714.38752"},{"key":"198_CR18","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.: Authenticating query results in edge computing. In: ICDE (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"198_CR19","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"issue":"2","key":"198_CR20","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. Trans. Storage 2(2), 107\u2013138 (2006)","journal-title":"Trans. Storage"},{"key":"198_CR21","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: DASFAA (2006)","DOI":"10.1007\/11733836_30"},{"key":"198_CR22","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Shacham, H., Lynn, B.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Eurocrypt (2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"198_CR23","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press (2001)"},{"key":"198_CR24","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols, 1 edn. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"198_CR25","unstructured":"Knuth, D.E.: The Art of Computer Programming, vol. 1, third edn. Pearson Education, Asia (2002)"},{"key":"198_CR26","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"198_CR27","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Eurocrypt (2009)","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"198_CR28","doi-asserted-by":"crossref","unstructured":"Kamakoti, V., Rangan, C.P.: An optimal algorithm for reconstructing a binary tree. Inf. Process. Lett. 42(2) (1992)","DOI":"10.1016\/0020-0190(92)90099-H"},{"key":"198_CR29","unstructured":"Das, S.K., Min, K.B., Halverson, R.H.: Efficient parallel algorithms for tree-related problems using the parenthesis matching strategy. In: IEEE ISPP (1994)"},{"issue":"1","key":"198_CR30","first-page":"138","volume":"1","author":"A Kundu","year":"2008","unstructured":"Kundu, A., Bertino, E.: Structural signatures for tree data structures. PVLDB 1(1), 138\u2013150 (2008)","journal-title":"PVLDB"},{"issue":"3","key":"198_CR31","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TSMCC.2008.919213","volume":"38","author":"A Kundu","year":"2008","unstructured":"Kundu, A., Bertino, E.: A new model for secure dissemination of xml content. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 38(3), 292\u2013301 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"198_CR32","doi-asserted-by":"crossref","unstructured":"Kundu, A., Bertino, E.: Secure dissemination of XML content using structure-based routing. In: IEEE EDOC (2006)","DOI":"10.1109\/EDOC.2006.46"},{"key":"198_CR33","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: SSYM (1998)"},{"key":"198_CR34","doi-asserted-by":"crossref","unstructured":"Harn, L.: Batch verifying multiple rsa digital signatures. Electron. Lett. 34(12) (1998)","DOI":"10.1049\/el:19980833"},{"key":"198_CR35","unstructured":"Hwang, M.S., Lin, I.C., Hwang, K.F.: Cryptanalysis of the batch verifying multiple rsa digital signatures. Informatica 11(1) (2000)"},{"key":"198_CR36","unstructured":"Hwang, M.S., Lee, C.C., Tang, Y.L.: Two simple batch verifying multiple digital signatures. In: ICICS (2001)"},{"key":"198_CR37","doi-asserted-by":"crossref","unstructured":"Bao, F., Lee, C.C., Hwang, M.S.: Cryptanalysis and improvement on batch verifying multiple rsa digital signatures. Appl. Math. Comput. 172(2) (2006)","DOI":"10.1016\/j.amc.2005.03.016"},{"key":"198_CR38","unstructured":"Goodrich, M., Tamassia, R.: Efficient authenticated dictionaries with skip lists and commutative hashing. Technical Report, Johns Hopkins Information Security Institute (2000)"},{"key":"198_CR39","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: CT-RSA (2003)","DOI":"10.1007\/3-540-36563-X_20"},{"key":"198_CR40","doi-asserted-by":"crossref","unstructured":"Kundu, A., Bertino, E.: How to authenticate graphs without leaking. In: EDBT (2010)","DOI":"10.1145\/1739041.1739114"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0198-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-013-0198-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0198-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T04:32:42Z","timestamp":1563078762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-013-0198-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,26]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["198"],"URL":"https:\/\/doi.org\/10.1007\/s10207-013-0198-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,26]]}}}