Sciweavers

EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 4 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino