Computing on Authenticated Data. Hyun Ahn, J., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., & Waters, B. In Proceedings of Theory of Cryptography Conference (TCC), pages 1-20, 2012.
Paper bibtex @inproceedings{ dblp2492205,
title = {Computing on Authenticated Data},
author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters},
author_short = {Hyun Ahn, J. and Boneh, D. and Camenisch, J. and Hohenberger, S. and Shelat, A. and Waters, B.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2012},
key = {dblp2492205},
id = {dblp2492205},
biburl = {http://www.dblp.org/rec/bibtex/conf/tcc/AhnBCHSW12},
url = {http://dx.doi.org/10.1007/978-3-642-28914-9_1},
conference = {TCC},
pages = {1-20},
text = {TCC 2012:1-20},
booktitle = {Proceedings of Theory of Cryptography Conference (TCC)}
}
Downloads: 0
{"_id":"EsuKEA3etu5JcmMxP","bibbaseid":"hyunahn-boneh-camenisch-hohenberger-shelat-waters-computingonauthenticateddata-2012","downloads":0,"creationDate":"2015-11-04T15:05:40.986Z","title":"Computing on Authenticated Data","author_short":["Hyun Ahn, J.","Boneh, D.","Camenisch, J.","Hohenberger, S.","Shelat, A.","Waters, B."],"year":2012,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/tcc/AhnBCHSW12","bibdata":{"title":"Computing on Authenticated Data","author":["Jae Hyun Ahn","Dan Boneh","Jan Camenisch","Susan Hohenberger","Abhi Shelat","Brent Waters"],"author_short":["Hyun Ahn, J.","Boneh, D.","Camenisch, J.","Hohenberger, S.","Shelat, A.","Waters, B."],"bibtype":"inproceedings","type":"inproceedings","year":"2012","key":"dblp2492205","id":"dblp2492205","biburl":"http://www.dblp.org/rec/bibtex/conf/tcc/AhnBCHSW12","url":"http://dx.doi.org/10.1007/978-3-642-28914-9_1","conference":"TCC","pages":"1-20","text":"TCC 2012:1-20","booktitle":"Proceedings of Theory of Cryptography Conference (TCC)","bibtex":"@inproceedings{ dblp2492205,\n title = {Computing on Authenticated Data},\n author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters},\n author_short = {Hyun Ahn, J. and Boneh, D. and Camenisch, J. and Hohenberger, S. and Shelat, A. and Waters, B.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2012},\n key = {dblp2492205},\n id = {dblp2492205},\n biburl = {http://www.dblp.org/rec/bibtex/conf/tcc/AhnBCHSW12},\n url = {http://dx.doi.org/10.1007/978-3-642-28914-9_1},\n conference = {TCC},\n pages = {1-20},\n text = {TCC 2012:1-20},\n booktitle = {Proceedings of Theory of Cryptography Conference (TCC)}\n}","bibbaseid":"hyunahn-boneh-camenisch-hohenberger-shelat-waters-computingonauthenticateddata-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-28914-9_1"},"downloads":0},"search_terms":["computing","authenticated","data","hyun ahn","boneh","camenisch","hohenberger","shelat","waters"],"keywords":[],"authorIDs":[],"dataSources":["3opZBB2PW8BYWzHbJ"]}