-
1
-
-
35248832513
-
Protecting against key exposure: Strongly key-insulated encryption with optimal threshold
-
BELLARE, M. AND PALACIO, A. 2002. Protecting against key exposure: strongly key-insulated encryption with optimal threshold. In Cryptology ePrint Archive, Report 2002/64.
-
(2002)
Cryptology ePrint Archive, Report 2002/64
-
-
Bellare, M.1
Palacio, A.2
-
2
-
-
0038223020
-
Forward integrity for secure audit logs
-
University of California at San Diego
-
BELLARE, M. AND YEE, B. 1997. Forward integrity for secure audit logs. Tech. rep. University of California at San Diego ftp://www.cs.ucsd.edu/pub/bsq/ pub/fi.ps.
-
(1997)
Tech. Rep.
-
-
Bellare, M.1
Yee, B.2
-
3
-
-
35248891000
-
Forward-Security in Private-Key Cryptography
-
Topics in Cryptology - CT-RSA 2003
-
BELLARE, M. AND YEE, B. 2003. Forward-security in private-key cryptography. In Proceedings of the RSA Conference Cryptography Track. (Pubitemid 36404407)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2612
, pp. 1-18
-
-
Bellare, M.1
Yee, B.2
-
4
-
-
65849294531
-
Verifiable audit trails for a version-ing file system
-
BURNS, R., GENTRY, C., LYNN, B., AND SHACHAM, H. 2005. Verifiable audit trails for a version-ing file system. In Proceedings of the Workshop on Storage and Security (StorageSS'05). 416-432.
-
(2005)
Proceedings of the Workshop on Storage and Security (StorageSS'05)
, pp. 416-432
-
-
Burns, R.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
50349097669
-
Secure audit logging with tamper resistant hardware
-
Univ. Twente, The Netherlands
-
CHONG, C., PENG, Z., AND HARTEL, P. 2002. Secure audit logging with tamper resistant hardware. In Technical Rep. TR-CTIT-02-29, Centre for Telematics and Information Technology, Univ. Twente, The Netherlands.
-
(2002)
Technical Rep. TR-CTIT-02-29, Centre for Telematics and Information Technology
-
-
Chong, C.1
Peng, Z.2
Hartel, P.3
-
6
-
-
84947254092
-
Key-insulated public key cryptosystems
-
DODIS, Y., KATZ, J., XU, S., AND YUNG, M. 2002. Key-insulated public key cryptosystems. In Proceedings of the Annual International Conference on Theory and Practice of Cryptographic Technique (Eurocrypt'02). 65-82.
-
(2002)
Proceedings of the Annual International Conference on Theory and Practice of Cryptographic Technique (Eurocrypt'02)
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
7
-
-
35248813300
-
Strong key-insulated signature schemes
-
DODIS, Y., KATZ, J., XU, S., AND YUNG, M. 2003. Strong key-insulated public key cryptosystems. In Proceedings of the Conference on Public Key Cryptography. 130-144. (Pubitemid 137638347)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
9
-
-
38349178199
-
Security and privacy for implantable medical devices
-
HALPERIN, D., KOHNO, T., HEYDT-BENJAMIN, T., FU, K., AND MAISEL, W. 2008. Security and privacy for implantable medical devices. IEEE Pervas. Comput. 7, 1.
-
(2008)
IEEE Pervas. Comput.
, vol.7
, Issue.1
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.3
Fu, K.4
Maisel, W.5
-
15
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
DOI 10.1145/1149976.1149977
-
MYKLETUN, E., NARASIMHA, M., AND TSUDIK, G. 2004a. Authentication and integrity in outsourced databases. In Proceedings of the ACM Annual Symposium on Network and Distributed System Security (NDSS'04). (Pubitemid 44232391)
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
16
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
MYKLETUN, E., NARASIMHA, M., AND TSUDIK, G. 2004b. Signature bouquets: immutability for aggrea-gated/codensed signatures. In Proceedings of the European Symposium on Research in Computer Security (ESORICS'04). 160-176. (Pubitemid 39738739)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3193
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
21
-
-
77952589508
-
Building an encrypted and searchable audit log
-
WATERS, B., BALFANZ, D., DURFEE, G., AND SMETERS, D. K. 2004. Building an encrypted and searchable audit log. In Proceedings of the ACM Annual Symposium on Network and Distributed System Security (NDSS'04).
-
(2004)
Proceedings of the ACM Annual Symposium on Network and Distributed System Security (NDSS'04)
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smeters, D.K.4
|