Authenticating the Query Results of Text Search Engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time may return incorrect results to the users. To prevent that, we introduce a methodology for generating an integrity proof...
Saved in:
Main Authors: | PANG, Hwee Hwa, MOURATIDIS, Kyriakos |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/423 https://ink.library.smu.edu.sg/context/sis_research/article/1422/viewcontent/VLDB08_TNRA.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Exploring XML data is as easy as using maps
by: Zeng, Y., et al.
Published: (2014) -
An Incremental Threshold Method for Continuous Text Search Queries
by: MOURATIDIS, Kyriakos, et al.
Published: (2009) -
Query Answer Authentication
by: PANG, Hwee Hwa, et al.
Published: (2012) -
Searching blogs and news: A study on popular queries
by: SUN, Aixin, et al.
Published: (2008) -
Efficient Evaluation of Continuous Text Seach Queries
by: MOURATIDIS, Kyriakos, et al.
Published: (2011)