Computing on Authenticated Data. Hyun Ahn, J., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., & Waters, B. In Proceedings of Theory of Cryptography Conference (TCC), pages 1-20, 2012.
Computing on Authenticated Data [link]Paper  bibtex   
@inproceedings{ dblp2492205,
  title = {Computing on Authenticated Data},
  author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters},
  author_short = {Hyun Ahn, J. and Boneh, D. and Camenisch, J. and Hohenberger, S. and Shelat, A. and Waters, B.},
  bibtype = {inproceedings},
  type = {inproceedings},
  year = {2012},
  key = {dblp2492205},
  id = {dblp2492205},
  biburl = {http://www.dblp.org/rec/bibtex/conf/tcc/AhnBCHSW12},
  url = {http://dx.doi.org/10.1007/978-3-642-28914-9_1},
  conference = {TCC},
  pages = {1-20},
  text = {TCC 2012:1-20},
  booktitle = {Proceedings of Theory of Cryptography Conference (TCC)}
}

Downloads: 0