-
1
-
-
0025849585
-
How to time-stamp a digital document
-
10.1007/BF00196791
-
Haber S, Stornetta WS (1991) How to time-stamp a digital document. J Cryptol 3:99-111 10.1007/BF00196791
-
(1991)
J. Cryptol.
, vol.3
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
2
-
-
0242585280
-
Improving the efficiency and reliability of digital time-stamping
-
Capocelli RM, De Santis A, Vaccaro U (eds) Springer, Berlin Heidelberg New York
-
Bayer D, Haber S, Stornetta WS (1993) Improving the efficiency and reliability of digital time-stamping. In: Capocelli RM, De Santis A, Vaccaro U (eds) Sequences II: Methods in communication, security, and computer science. Springer, Berlin Heidelberg New York, pp 329-334
-
(1993)
Sequences II: Methods in Communication, Security, and Computer Science
, pp. 329-334
-
-
Bayer, D.1
Haber, S.2
Stornetta, W.S.3
-
5
-
-
35248891000
-
Forward-security in private-key cryptography
-
Joye M (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Bellare M, Yee B (2003) Forward-security in private-key cryptography. In: Joye M (ed) Topics in Cryptology - CT-RSA 03. Lecture notes in computer science, vol 2612. Springer, Berlin Heidelberg New York
-
(2003)
Topics in Cryptology - CT-RSA 03
, vol.2612
-
-
Bellare, M.1
Yee, B.2
-
6
-
-
0038223020
-
Forward integrity for audit logs
-
Technical report, UCSD tech report
-
Bellare M, Yee B (1997) Forward integrity for audit logs. Technical report, UCSD tech report
-
(1997)
-
-
Bellare, M.1
Yee, B.2
-
8
-
-
35048828815
-
Enhanced accountability for electronic processes
-
Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Baldwin A (2004) Enhanced accountability for electronic processes. In: 2nd international conference on trust management. Lecture notes in computer science, vol. Springer, Berlin Heidelberg New York
-
(2004)
2nd International Conference on Trust Management
-
-
Baldwin, A.1
-
9
-
-
84956984263
-
Time-stamping with binary linking schemes
-
Krawczyk H (ed) Santa Barbara, CA. Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Buldas A, Laud P, Lipmaa H, Villemson J (1998) Time-stamping with binary linking schemes. In: Krawczyk H (ed) Advances on Cryptology - CRYPTO '98, Santa Barbara, CA. Lecture notes in computer science, vol 1462. Springer, Berlin Heidelberg New York, pp 486-501
-
(1998)
Advances on Cryptology - CRYPTO '98
, vol.1462
, pp. 486-501
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
10
-
-
0003855464
-
-
2nd edn: Protocols, algorithms and source code in C. Wiley, NewYork
-
Schneier B (1996) Applied cryptography, 2nd edn: Protocols, algorithms and source code in C. Wiley, NewYork
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
11
-
-
0003900671
-
Rfc 3161 Internet x.509 public key infrastructure time stamp protocol (tsp)
-
Adams C, Cain P, Pinkas D, Zuccherato R (2001) Rfc 3161 Internet x.509 public key infrastructure time stamp protocol (tsp). http://www.ietf.org/rfc/rfc3161.txt
-
(2001)
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
13
-
-
0142250276
-
Hardware encapsulation of security services
-
Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Baldwin A, Shiu S (2003) Hardware encapsulation of security services. In: Compter Security: Proceedings of ESORICS 2003. Lecture notes in computer science, vol 2808. Springer, Berlin Heidelberg New York
-
(2003)
Compter Security: Proceedings of ESORICS 2003
, vol.2808
-
-
Baldwin, A.1
Shiu, S.2
-
16
-
-
35248883573
-
Hardware security appliances for trust
-
Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Baldwin A, Shiu S (2003) Hardware security appliances for trust. In: 1st international conference on trust management. Lecture notes in computer science, vol 2692. Springer, Berlin Heidelberg New York
-
(2003)
1st International Conference on Trust Management
, vol.2692
-
-
Baldwin, A.1
Shiu, S.2
-
17
-
-
1242295745
-
Security requirements for cryptographic modules
-
FIPS fips 140-2
-
FIPS (2001) Security requirements for cryptographic modules. fips 140-2. http://csrc.nist.gov/cryptval/140-2.htm
-
(2001)
-
-
-
18
-
-
84958045366
-
Using a high performance programmable secure coprocessor
-
Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Smith SW, Palmer ER, Weingart S (1998) Using a high performance programmable secure coprocessor. In: 2nd international conference on financial cryptography. Lecture notes in computer science, vol. Springer, Berlin Heidelberg New York
-
(1998)
2nd International Conference on Financial Cryptography
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
-
19
-
-
85084164226
-
Secure coprocessor integration with kerberos V5
-
Itoi N (2000) Secure coprocessor integration with kerberos V5. In: Usenix security symposium, pp 113-128
-
(2000)
Usenix Security Symposium
, pp. 113-128
-
-
Itoi, N.1
-
20
-
-
0038684362
-
Practical private information retrieval with secure coprocessors
-
Technical report, IBM Research TJ Watson Research Center, Yorktown Heights, NY
-
Smith SW, Safford D (2000) Practical private information retrieval with secure coprocessors. Technical report, IBM Research TJ Watson Research Center, Yorktown Heights, NY. http://www.research.ibm.com/ secure_systems_department/projects/scop/papers/rc21806.pdf
-
(2000)
-
-
Smith, S.W.1
Safford, D.2
-
21
-
-
27144464694
-
A flexible role-based secure messaging service: Exploiting ibe technology for privacy in health care
-
IEEE Press, New York
-
Casassa Mont M, Bramhall P, Harrison K (2003) A flexible role-based secure messaging service: Exploiting ibe technology for privacy in health care. In: DEXA Workshops. IEEE Press, New York
-
(2003)
DEXA Workshops
-
-
Casassa Mont, M.1
Bramhall, P.2
Harrison, K.3
-
22
-
-
0004016411
-
-
Erlbaum, Hillsdale, NJ
-
Schank R, Abelson R (1977) Scripts, Plans, Goals and Understanding. Erlbaum, Hillsdale, NJ
-
(1977)
Scripts, Plans, Goals and Understanding
-
-
Schank, R.1
Abelson, R.2
|