메뉴 건너뛰기




Volumn 3, Issue 2, 1991, Pages 99-111

How to time-stamp a digital document

Author keywords

Hash; Time stamp

Indexed keywords

COMPUTER NETWORKS--SECURITY SYSTEMS; DATA PROCESSING--SECURITY OF DATA;

EID: 0025849585     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00196791     Document Type: Article
Times cited : (663)

References (22)
  • 1
    • 84934215988 scopus 로고    scopus 로고
    • J. Alter. When photographs lie. Newsweek, pp. 44–45, July 30, 1990.
  • 3
    • 84934215987 scopus 로고    scopus 로고
    • G. Brassard and M. Yung. One-way group actions. In Advances in Cryptology—Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
  • 6
    • 84934215986 scopus 로고    scopus 로고
    • A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology—Eurocrypt '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
  • 8
    • 84934215985 scopus 로고    scopus 로고
    • Z. Galil, S. Haber, and M. Yung. Interactive public-key cryptosystems. Submitted for publication, 1990.
  • 11
    • 84934215977 scopus 로고    scopus 로고
    • A. Grundberg. Ask it no questions: The camera can lie. The New York Times, Section 2, pp. 1, 29, August 12,1990.
  • 15
    • 84934215979 scopus 로고    scopus 로고
    • R. C. Merkle. Secrecy, authentication, and public-key systems. Ph.D. thesis, Stanford University, 1979.
  • 19
    • 84934215978 scopus 로고    scopus 로고
    • R. Rivest. The MD4 message digest algorithm. In Advances in Cryptology—Crypto '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
  • 20
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM, New York
    • (1990) Proc. 22nd STOC , pp. 387-394
    • Rompel, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.