{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:55:40Z","timestamp":1775638540107,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,6,27]],"date-time":"2006-06-27T00:00:00Z","timestamp":1151366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,6,27]]},"DOI":"10.1145\/1142473.1142488","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"121-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":292,"title":["Dynamic authenticated index structures for outsourced databases"],"prefix":"10.1145","author":[{"given":"Feifei","family":"Li","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Marios","family":"Hadjieleftheriou","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"George","family":"Kollios","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Leonid","family":"Reyzin","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2006,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_2_1","unstructured":"{2} Authenticated Index Structures Library. http:\/\/cs-people.bu.edu\/lifeifei\/aisl\/. {2} Authenticated Index Structures Library. http:\/\/cs-people.bu.edu\/lifeifei\/aisl\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.63"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066276"},{"key":"e_1_3_2_1_5_1","first-page":"1133","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Bouganim L.","year":"2003","unstructured":"{5} L. Bouganim , F. D. Ngoc , P. Pucheral , and L. Wu . Chip-secured data access: Reconciling access rights with data encryption . In Proc. of Very Large Data Bases (VLDB) , pages 1133 - 1136 , 2003 . {5} L. Bouganim, F. D. Ngoc, P. Pucheral, and L. Wu. Chip-secured data access: Reconciling access rights with data encryption. In Proc. of Very Large Data Bases (VLDB), pages 1133-1136, 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"e_1_3_2_1_7_1","unstructured":"{7} Crypto++ Library. http:\/\/www.eskimo.com\/~weidai\/cryptlib.html. {7} Crypto++ Library. http:\/\/www.eskimo.com\/~weidai\/cryptlib.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876663"},{"key":"e_1_3_2_1_9_1","first-page":"101","volume-title":"IFIP Workshop on Database Security (DBSec)","author":"Devanbu P.","year":"2000","unstructured":"{9} P. Devanbu , M. Gertz , C. Martel , and S. G. Stubblebine . Authentic third-party data publication . In IFIP Workshop on Database Security (DBSec) , pages 101 - 112 , 2000 . {9} P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security (DBSec), pages 101-112, 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/876875.879015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316752"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"e_1_3_2_1_17_1","first-page":"49","volume-title":"Proc. of the Symposium in Applied Mathematics","author":"McCurley K.","year":"1990","unstructured":"{17} K. McCurley . The discrete logarithm problem . In Proc. of the Symposium in Applied Mathematics , pages 49 - 74 . American Mathematical Society , 1990 . {17} K. McCurley. The discrete logarithm problem. In Proc. of the Symposium in Applied Mathematics, pages 49-74. American Mathematical Society, 1990."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705190"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315528"},{"key":"e_1_3_2_1_21_1","volume-title":"Symposium on Network and Distributed Systems Security (NDSS)","author":"Mykletun E.","year":"2004","unstructured":"{21} E. Mykletun , M. Narasimha , and G. Tsudik . Authentication and integrity in outsourced databases . In Symposium on Network and Distributed Systems Security (NDSS) , 2004 . {21} E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Symposium on Network and Distributed Systems Security (NDSS), 2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099604"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.180-1","volume-title":"FIPS PUB 180-1: Secure Hash Standard","author":"{24} National Institute of Standards and Technology.","year":"1995","unstructured":"{24} National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard . National Institute of Standards and Technology , 1995 . {24} National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology, 1995."},{"key":"e_1_3_2_1_25_1","unstructured":"{25} OpenSSL. http:\/\/www.openssl.org. {25} OpenSSL. http:\/\/www.openssl.org."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/977401.978163"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_30_1","first-page":"601","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Sion R.","year":"2005","unstructured":"{30} R. Sion . Query execution assurance for outsourced databases . In Proc. of Very Large Data Bases (VLDB) , pages 601 - 612 , 2005 . {30} R. Sion. Query execution assurance for outsourced databases. In Proc. of Very Large Data Bases (VLDB), pages 601-612, 2005."},{"key":"e_1_3_2_1_31_1","volume-title":"CS Department","author":"Tamassia R.","year":"2005","unstructured":"{31} R. Tamassia and N. Triandopoulos . Efficient Content Authentication over Distributed Hash Tables. Technical report , CS Department , Brown University , 2005 . {31} R. Tamassia and N. Triandopoulos. Efficient Content Authentication over Distributed Hash Tables. Technical report, CS Department, Brown University, 2005."}],"event":{"name":"SIGMOD\/PODS06: International Conference on Management of Data and Symposium on Principles Database and Systems","location":"Chicago IL USA","acronym":"SIGMOD\/PODS06","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2006 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142473.1142488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1142473.1142488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:19Z","timestamp":1750259179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142473.1142488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6,27]]},"references-count":29,"alternative-id":["10.1145\/1142473.1142488","10.1145\/1142473"],"URL":"https:\/\/doi.org\/10.1145\/1142473.1142488","relation":{},"subject":[],"published":{"date-parts":[[2006,6,27]]},"assertion":[{"value":"2006-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}