TY - CHAP
T1 - Authenticated data structures for graph and geometric searching
AU - Goodrich, Michael T.
AU - Tamassia, Roberto
AU - Triandopoulos, Nikos
AU - Cohen, Robert
PY - 2003
Y1 - 2003
N2 - Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We present techniques for authenticating data structures that represent graphs and collections of geometric objects. In our model, a data structure maintained by a trusted source is mirrored at distributed directories that answer queries and provide proof of correctness. Our work has applications to the authentication of network management systems and geographic information systems.
AB - Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We present techniques for authenticating data structures that represent graphs and collections of geometric objects. In our model, a data structure maintained by a trusted source is mirrored at distributed directories that answer queries and provide proof of correctness. Our work has applications to the authentication of network management systems and geographic information systems.
UR - http://www.scopus.com/inward/record.url?scp=35248831605&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35248831605&partnerID=8YFLogxK
U2 - 10.1007/3-540-36563-x_20
DO - 10.1007/3-540-36563-x_20
M3 - Chapter
AN - SCOPUS:35248831605
SN - 3540008470
SN - 9783540008477
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 295
EP - 313
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A2 - Joye, Marc
ER -