Authenticated hash tables

  • Charalampos Papamanthou
  • , Roberto Tamassia
  • , Nikos Triandopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

104 Scopus citations

Fingerprint

Dive into the research topics of 'Authenticated hash tables'. Together they form a unique fingerprint.
Sort by

Computer Science