共 27 条
[1]
Anagnostopoulos A., Goodrich M.T., Tamassia R., Persistent authenticated dictionaries and their applications, Proc. Information Security Conference (ISC 2001), Lecture Notes in Computer Science, 2001, 2200, pp. 379-393
[2]
Amato N.M., Loui M.C., Checking linked data structures, Proceedings of the 24th Annual International Symposium on Fault-Tolerant Computing (FTPS), 1994, pp. 164-173
[3]
Anderson R.J., The eternity service, Proceedings of Pragocrypt, 1996
[4]
Berg M.D., Kreveld M.V., Overmars M., Schwarzkopf O., Computational Geometry
[5]
Blum M., Evans W., Gemmell P., Kannan S., Noar M., Checking the inclusiveness of memories, Algorithmica, 12, 2-3, pp. 225-244, (1994)
[6]
Bray T., Paoli J., Sperberg-McQueen C., Extensible markup language (XML) 1.0, (1998)
[7]
Castano S., Fugini M., Martella G., Samarati P., Database Security, (1995)
[8]
Date C.J., An Introduction to Database Systems, 7th Edn, (1999)
[9]
Date C.J., Darwen H., A Guide to the SQL Standard, 4th Edn, (1997)
[10]
Devanbu P., Gertz M., Kwong A., Martel C., Stubblebine S., Flexible authentication of XML documents, Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS-8), ACM, 2001, pp. 136-145