[1] DEVANBU P, GERTZ M, MARTEL C, et al. Authentic third-party data publication[M]//THURAISINGHAM B, VAN DE RIET R, DITTRICH K R, et al. Data and Application Security. Berlin: Springer, 2000: 101-112. [2] MERKLE R C. A certified digital signature[C]//CRYPTO 1989: Proceedings on Advances in Cryptology. Berlin: Springer, 1989: 218-238. [3] PANG H H, TAN K L. Authenticating query results in edge computing[C]//Proceedings of the 20th International Conference on Data Engineering. Piscataway, NJ: IEEE, 2004: 560-571. [4] PANG H H, JAIN A, RAMAMRITHAM K, et al. Verifying completeness of relational query results in data publishing[C]//SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2005: 407-418. [5] NARASIMHA M, TSUDIK G. DSAC: integrity of outsourced databases with signature aggregation and chaining[C]//CIKM 2005: Proceedings of the 14th ACM International Conference on Information and Knowledge Management. New York: ACM, 2005: 235-236. [6] CHENG W, PANG H H, TAN K. Authenticating multi-dimensional query results in data publishing[C]//DBSEC 2006: Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security. Berlin: Springer, 2006: 60-73. [7] LI F, HADJIELEFTHERIOU M, KOLLIOS G, et al. Dynamic authenticated index structures for outsourced databases[C]//SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2006: 121-132. [8] YANG Y, PAPADOPOULOS S, PAPADIAS D, et al. Authenticated indexing for outsourced spatial databases[J]. The VLDB Journal, 2009, 18(3): 631-648. [9] YANG Y, PAPADOPOULOS S, PAPADIAS D, et al. Spatial outsourcing for location-based services[C]//ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. Washington, DC: IEEE Computer Society, 2008: 1082-1091. [10] MOURATIDIS K, SACHARIDIS D, PANG H H. Partially materialized digest scheme: an efficient verification method for outsourced databases[J]. The VLDB Journal, 2009, 18(1): 363-381. [11] 谢晴晴, 王良民.基于PMD的外包数据流范围查询验证方案[J]. 计算机科学与探索, 2015, 9(10): 1209-1218.(XIE Q Q, WANG L M. Data stream range query authentication scheme based on PMD in outsourced database[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(10): 1209-1218.) [12] HU H, XU J, CHEN G, et al. Authenticating location-based services without compromising location privacy[C]//SIGMOD 2012: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2012: 301-312. |