Cited By
View all- Zhang YPapamanthou CKatz J(2018)Verifiable Graph ProcessingACM Transactions on Privacy and Security10.1145/323318121:4(1-23)Online publication date: 1-Oct-2018
- Bender MFarach-Colton MJohnson RMauras SMayer TPhillips CXu HSallinger EVan den Bussche JGeerts F(2017)Write-Optimized Skip ListsProceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/3034786.3056117(69-78)Online publication date: 9-May-2017
- Chase MMeiklejohn SWeippl EKatzenbeisser SKruegel CMyers AHalevi S(2016)Transparency Overlays and ApplicationsProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978404(168-179)Online publication date: 24-Oct-2016
- Show More Cited By