Login / Signup
A Log-Structured Merge Tree-aware Message Authentication Scheme for Persistent Key-Value Stores.
Ig-Jae Kim
J. Hyun Kim
Minu Chung
Hyungon Moon
Sam H. Noh
Published in:
FAST (2022)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
tree structure
public key
image authentication
secret key
least significant bit
security flaws
real time
database systems
index structure
end to end