@book{katz2007introduction,
	title={Introduction to modern cryptography: principles and protocols},
	author={Katz, Jonathan and Lindell, Yehuda},
	year={2007},
	publisher={CRC Press}
}
@techreport{kundustructural,
	title={Structural signatures: How to authenticate trees without leaking},
	author={Kundu, Ashish and Bertino, Elisa},
	institution={Technical report, Purdue University (June 2010)},
	year={2010}
}
@incollection{boneh2003aggregate,
	title={Aggregate and verifiably encrypted signatures from bilinear maps},
	author={Boneh, Dan and Gentry, Craig and Lynn, Ben and Shacham, Hovav},
	booktitle={Advances in cryptology—EUROCRYPT 2003},
	pages={416--432},
	year={2003},
	publisher={Springer}
}
@article{kamakoti1992optimal,
	title={An optimal algorithm for reconstructing a binary tree},
	author={Kamakoti, V and Pandu Rangan, C},
	journal={Information processing letters},
	volume={42},
	number={2},
	pages={113--115},
	year={1992},
	publisher={Elsevier}
}
@misc{knuth1968art,
	title={The Art of Computer Programming 1: Fundamental Algorithms},
	author={Knuth, D},
	year={1968},
	publisher={MA: Addison-Wesley}
}
@inproceedings{das1994efficient,
	title={Efficient parallel algorithms for tree-related problems using the parentheses matching strategy},
	author={Das, Sajal K and Halverson, Ranette H and Min, Kwang Bae},
	booktitle={Parallel Processing Symposium, 1994. Proceedings., Eighth International},
	pages={362--367},
	year={1994},
	organization={IEEE}
}
@article{mykletun2006authentication,
	title={Authentication and integrity in outsourced databases},
	author={Mykletun, Einar and Narasimha, Maithili and Tsudik, Gene},
	journal={ACM Transactions on Storage (TOS)},
	volume={2},
	number={2},
	pages={107--138},
	year={2006},
	publisher={ACM}
}
@misc{ wiki:ciph,
   author = "Wikipedia",
   title = "Adaptive chosen ciphertext attack --- Wikipedia{,} The Free Encyclopedia",
   year = "2014",
   url = "http://en.wikipedia.org/w/index.php?title=Adaptive_chosen-ciphertext_attack&oldid=602872550",
   note = "[Online; accessed 1-July-2014]"
}
@misc{ wiki:rep,
 	author = "Wikipedia",
 	title = "Replay Attacks --- Wikipedia{,} The Free Encyclopedia",
 	year = "2014",
 	url = "http://en.wikipedia.org/wiki/Replay_attack",
 	note = "[Online; accessed 1-July-2014]"
}
@inproceedings{merkle1990one,
  title={One way hash functions and DES},
  author={Merkle, Ralph C},
  booktitle={Advances in Cryptology—CRYPTO’89 Proceedings},
  pages={428--446},
  year={1990},
  organization={Springer}
}
@incollection{di2008access,
  title={Access control models for XML},
  author={di Vimercati, S De Capitani and Foresti, Sara and Paraboschi, Stefano and Samarati, Pierangela},
  booktitle={Handbook of Database Security},
  pages={27--53},
  year={2008},
  publisher={Springer}
}
@misc{ wiki:mss,
   author = "Wikipedia",
   title = "Merkle signature scheme --- Wikipedia{,} The Free Encyclopedia",
   year = "2014",
   url = "http://en.wikipedia.org/w/index.php?title=Merkle_signature_scheme&oldid=607171260",
   note = "[Online; accessed 1-July-2014]"
}
@article{kundu2008new,
  title={A new model for secure dissemination of xml content},
  author={Kundu, Ashish and Bertino, Elisa},
  journal={Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on},
  volume={38},
  number={3},
  pages={292--301},
  year={2008},
  publisher={IEEE}
}
@misc{madhavbin,
	title = {Reconstructing binary tree from tree traversals},
	author = {Madhav Mukund},
	year = {2006},
	url = {http://www.cmi.ac.in/~madhavan/courses/programming06/lecture12-21sep2006.txt},
	note = {Online; accessed 29-June-2014}
}
@incollection{goodrich2003authenticated,
  title={Authenticated data structures for graph and geometric searching},
  author={Goodrich, Michael T and Tamassia, Roberto and Triandopoulos, Nikos and Cohen, Robert},
  booktitle={Topics in Cryptology—CT-RSA 2003},
  pages={295--313},
  year={2003},
  publisher={Springer}
}
@article{kundu2012efficient,
	title={Efficient Leakage-free Authentication of Trees, Graphs and Forests.},
	author={Kundu, Ashish and Atallah, Mikhail J and Bertino, Elisa},
	journal={IACR Cryptology ePrint Archive},
	volume={2012},
	year={2012}
}
@article{fung2010privacy,
	title={Privacy-preserving data publishing: A survey of recent developments},
	author={Fung, Benjamin and Wang, Ke and Chen, Rui and Yu, Philip S},
	journal={ACM Computing Surveys (CSUR)},
	year={2010},
	publisher={ACM}
}
@inproceedings{miller2014authenticated,
	title={Authenticated data structures, generically},
	author={Miller, Andrew and Hicks, Michael and Katz, Jonathan and Shi, Elaine},
	booktitle={Proceedings of the 41st annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages},
	pages={411--424},
	year={2014},
	organization={ACM}
}
@inproceedings{kissner2005privacy,
  title={Privacy-preserving set operations},
  author={Kissner, Lea and Song, Dawn},
  booktitle={Advances in Cryptology--CRYPTO 2005},
  pages={241--257},
  year={2005},
  organization={Springer}
}