{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:33Z","timestamp":1750307553264,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-08-1-0265 MURI award"],"award-info":[{"award-number":["FA9550-08-1-0265 MURI award"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1739041.1739114","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T19:27:05Z","timestamp":1268767625000},"page":"609-620","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["How to authenticate graphs without leaking"],"prefix":"10.1145","author":[{"given":"Ashish","family":"Kundu","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497478"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"F. Bao C.-C. Lee and M.-S. Hwang. Cryptanalysis and improvement on batch verifying multiple rsa digital signatures. Applied Mathematics and Computation 172(2) 2006.  F. Bao C.-C. Lee and M.-S. Hwang. Cryptanalysis and improvement on batch verifying multiple rsa digital signatures. Applied Mathematics and Computation 172(2) 2006.","DOI":"10.1016\/j.amc.2005.03.016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871796"},{"volume-title":"Addison-Wesley","year":"2002","author":"Bishop M.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_7_1","first-page":"150","volume-title":"Public Key Cryptography","author":"Buldas A.","year":"2007"},{"volume-title":"MIT Press","year":"2001","author":"Cormen T. H.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"11","author":"Devanbu P.","year":"2003","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.506.0545"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117456"},{"key":"e_1_3_2_1_12_1","unstructured":"M. Goodrich and R. Tamassia. Efficient authenticated dictionaries with skip lists and commutative hashing 2000.  M. Goodrich and R. Tamassia. Efficient authenticated dictionaries with skip lists and commutative hashing 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-009-9355-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980833"},{"volume-title":"Proceedings of Information and Communications Security","year":"2001","author":"Hwang M.-S.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"M.-S. Hwang I.-C. Lin and K.-F. Hwang. Cryptanalysis of the batch verifying multiple rsa digital signatures. Informatica 11(1) 2000.  M.-S. Hwang I.-C. Lin and K.-F. Hwang. Cryptanalysis of the batch verifying multiple rsa digital signatures. Informatica 11(1) 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376677"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Katz and Y. Lindell. Introduction to Modern Cryptography: Principles and Protocols. Chapman &amp; Hall\/CRC 1 edition 2007.   J. Katz and Y. Lindell. Introduction to Modern Cryptography: Principles and Protocols . Chapman &amp; Hall\/CRC 1 edition 2007.","DOI":"10.1201\/9781420010756"},{"key":"e_1_3_2_1_20_1","unstructured":"D. E. Knuth. The Art of Computer Programming volume 1. Pearson Education Asia third edition 2002.  D. E. Knuth. The Art of Computer Programming volume 1. Pearson Education Asia third edition 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"volume-title":"CRYPTO","year":"1989","author":"Merkle R. C.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0108-z"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"H. Pang and K. Mouratidis. Authenticating the query results of text search engines. PVLDB 1(1) 2008.   H. Pang and K. Mouratidis. Authenticating the query results of text search engines. PVLDB 1(1) 2008.","DOI":"10.14778\/1453856.1453875"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/977401.978163"},{"key":"e_1_3_2_1_31_1","volume-title":"In Proc. Symp. Applied Math., AMS","volume":"62","author":"Garrett D. L. e. P. B.","year":"2003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281272"},{"volume-title":"VLDB","year":"2006","author":"Wang H.","key":"e_1_3_2_1_33_1"},{"volume-title":"PinKDD","year":"2007","author":"Zheleva E.","key":"e_1_3_2_1_34_1"}],"event":{"name":"EDBT\/ICDT '10: EDBT\/ICDT '10 joint conference","acronym":"EDBT\/ICDT '10","location":"Lausanne Switzerland"},"container-title":["Proceedings of the 13th International Conference on Extending Database Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1739041.1739114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1739041.1739114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:41Z","timestamp":1750249421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1739041.1739114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":34,"alternative-id":["10.1145\/1739041.1739114","10.1145\/1739041"],"URL":"https:\/\/doi.org\/10.1145\/1739041.1739114","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}