Ads
-
Related paper
- AN EFFECTIVE SPATIAL QUERY INTEGRITY USING MERKLE HASH TREE
- Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID
- Association Rule Hiding using Hash Tree
- Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
- IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks
- Privacy Protected Query Processing on Spatial Networks
- Best Keyword Query Search Using Minimum Spatial Cover.pdf
- BITS-Tree -- An Efficient Data Structure for Segment Storage and Query Processing
- ANALYSIS OF THE USE OF THE HIGHLY EFFECTIVE IMPLEMENTATION OF THE SHA-512 HASH FUNCTIONS FOR THE DEVELOPMENT OF SOFTWARE SYSTEMS
- Query authentication based on Apriori algorithm in outsourcing spatial database