Sciweavers

2 search results - page 1 / 1
» On the Cost of Persistence and Authentication in Skip Lists
Sort
View
WEA
2007
Springer
131views Algorithms» more  WEA 2007»
14 years 27 days ago
On the Cost of Persistence and Authentication in Skip Lists
We present an extensive experimental study of authenticated data structures for dictionaries and maps implemented with skip lists. We consider realizations of these data structures...
Michael T. Goodrich, Charalampos Papamanthou, Robe...
ICICS
2007
Springer
13 years 10 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia