Authenticated hash tables", (2008)

by C Papamanthou, R Tamassia, N Triandopoulos
Venue:CCS '08: Proc. 15th ACM Conf. on Computer and communications security,