Authentication of Data Structures for Graph
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Authenticated data structures provides cryptographic proofs where the answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We have presented few techniques for authenticating data structures that represent graphs and geometric data’s. A model has been given to represent the source and functions of working authentication of data structures for graph and geometric searching. We have also mention answering queries at distributed directories. When a user queries a directory, it receives a cryptographic proof in answer, where the proof contains statement by the source. We have also shown how to efficiently authenticate data for fundamental problems, such as on geometric objects, etc. this allows the design of new, efficient authenticated data structures for fundamental problem on network, such as path and connectivity queries over graphs.
Authors and Affiliations
Anurag Sharma, Vikram Singh, Jaspal Yadav
Design and Parametric Analysis of Multiband Directional Antenna for Wireless Applications
This paper presents an aperture coupled multiband microstrip antenna for various wireless applications. The antenna consists of microstrip fed slot with a complimentary stub on a single dielectric medium. A reflecting g...
Advancement in Material Science
Material science is a branch of science with a myriad of disciplines, which encompass the investigation and improvement of novel robust materials with the desired physical and chemical properties. Today material science...
A Booster and PWM Based Power Amplifier for Reaction Wheel
Reaction wheel is an inertial actuator in a spacecraft attitude control system and is used to generate suitable attitude control torques for correcting spacecraft attitude deviation or adjusting to an assigned attitude....
Improving Network Lifetime Using Mobile Sink in Clustered Wireless Sensor Networks
In Wireless Sensor Networks, sensors are used to detect abnormal event and report the sensed data to the sink. Sensors have limited power resources. Sensor nodes deliver sensed data back to the sink. The sensor nodes ne...
Implementation of an Enhanced Wilkinson’s Power Divider using Low Pass Filters
A novel design of power divider using pi-filter is proposed in this paper which suppresses the harmonics in the circuit. There are several advantages of using this design. The simplicity of the circuit is enhanced as th...