{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:08:06Z","timestamp":1742396886917,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icde.2008.4497478","type":"proceedings-article","created":{"date-parts":[[2008,4,29]],"date-time":"2008-04-29T15:04:39Z","timestamp":1209481479000},"page":"696-704","source":"Crossref","is-referenced-by-count":20,"title":["Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors"],"prefix":"10.1109","author":[{"given":"Mikhail J.","family":"Atallah","sequence":"first","affiliation":[]},{"given":"YounSun","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Kundu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"93","author":"rohatgi","year":"2001","journal-title":"A compact and fast hybrid signature scheme for multicast packet"},{"key":"15","first-page":"217","author":"naor","year":"1998","journal-title":"Certificate revocation and certificate update"},{"key":"16","first-page":"28","author":"perrig","year":"2001","journal-title":"The biba one-time signature and broadcast authentication protocol"},{"key":"13","article-title":"a general model for authentic data publication","volume":"39","author":"martel","year":"2001","journal-title":"Algorithmica"},{"key":"14","first-page":"218","volume":"435","author":"merkle","year":"1989","journal-title":"A certified digital signature"},{"key":"11","article-title":"on certificate revocation and validation","volume":"1465","author":"kocher","year":"1998","journal-title":"LNCS"},{"key":"12","first-page":"28","author":"lamport","year":"1979","journal-title":"Constructing digital signatures from a one-way function"},{"key":"3","first-page":"416","article-title":"aggregate and verifiably encrypted signatures from bilinear maps","author":"boneh","year":"2003","journal-title":"Eurocrypt"},{"key":"2","first-page":"309","author":"berkman","year":"1989","journal-title":"Highly parallelizable problems (extended abstract)"},{"key":"1","first-page":"88","author":"bender","year":"2000","journal-title":"The lea problem revisited"},{"journal-title":"Escrow services and incentives in peer-to-peer networks","year":"2001","author":"home","key":"10"},{"journal-title":"Efficient authenticated dictionaries with skip lists and commutative hashing","year":"2000","author":"goodrich","key":"7"},{"key":"6","article-title":"authentic third-party data publication","volume":"11","author":"devanbu","year":"2003","journal-title":"Computers & Security"},{"key":"5","first-page":"136","author":"devanbu","year":"2001","journal-title":"Flexible authentication of xml documents"},{"key":"4","first-page":"703","article-title":"filtering search: a new approach to query-answering. siam","volume":"15","author":"chazelle","year":"1983","journal-title":"Comput"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1137\/0213024"},{"key":"8","first-page":"295","article-title":"authenticated data structures for graph and geometric searching","volume":"2612","author":"goodrich","year":"2003","journal-title":"LNCS"}],"event":{"name":"2008 IEEE 24th International Conference on Data Engineering (ICDE 2008)","start":{"date-parts":[[2008,4,7]]},"location":"Cancun, Mexico","end":{"date-parts":[[2008,4,12]]}},"container-title":["2008 IEEE 24th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4492792\/4497384\/04497478.pdf?arnumber=4497478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:19:08Z","timestamp":1489663148000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4497478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icde.2008.4497478","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}