Authenticated hash tables

Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

101 Scopus citations

Fingerprint

Dive into the research topics of 'Authenticated hash tables'. Together they form a unique fingerprint.

Computer Science