-
1
-
-
21044449695
-
-
Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
-
Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
0242585280
-
Improving the efficiency and reliability of digital time-stamping
-
Bayer, D., Haber, S., Stornetta, W.: Improving the efficiency and reliability of digital time-stamping. In: Sequences II: Methods in Communication, Security, and Computer Science, pp. 329-334 (1993)
-
(1993)
Sequences II: Methods in Communication, Security, and Computer Science
, pp. 329-334
-
-
Bayer, D.1
Haber, S.2
Stornetta, W.3
-
3
-
-
70350356194
-
-
Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report TRMCS- 91-1, Clarkson University, Departments of Mathematics and Computer Science (1991)
-
Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report TRMCS- 91-1, Clarkson University, Departments of Mathematics and Computer Science (1991)
-
-
-
-
4
-
-
77954337428
-
CHRONOS: An authenticated dictionary based on skip lists for time-stamping systems
-
ACM, New York
-
Blibech, K., Gabillon, A.: CHRONOS: An authenticated dictionary based on skip lists for time-stamping systems. In: Proc. Workshop on Secure Web Services, pp. 84-90. ACM, New York (2005)
-
(2005)
Proc. Workshop on Secure Web Services
, pp. 84-90
-
-
Blibech, K.1
Gabillon, A.2
-
5
-
-
33745884379
-
A new time-stamping scheme based on skip lists
-
Gavrilova, M.L, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Lagana, A, Mun, Y, Choo, H, eds, ICCSA 2006, Springer, Heidelberg
-
Blibech, K., Gabillon, A.: A new time-stamping scheme based on skip lists. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagana, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 395-405. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3982
, pp. 395-405
-
-
Blibech, K.1
Gabillon, A.2
-
6
-
-
70350399783
-
-
Buldas, A., Laud, P.: New linking schemes for digital time-stamping. In: Proc. 1st International Conference on Information Security and Cryptology (ICISC), pp. 3-13. Korea Institute of Information Security and Cryptology, KIISC (1998)
-
Buldas, A., Laud, P.: New linking schemes for digital time-stamping. In: Proc. 1st International Conference on Information Security and Cryptology (ICISC), pp. 3-13. Korea Institute of Information Security and Cryptology, KIISC (1998)
-
-
-
-
7
-
-
0034449541
-
Accountable certificate management using undeniable attestations
-
ACM, New York
-
Buldas, A., Laud, P., Lipmaa, H.: Accountable certificate management using undeniable attestations. In: Proc. 7th ACM Conference on Computer and Communication Security (CCS), pp. 9-17. ACM, New York (2000)
-
(2000)
Proc. 7th ACM Conference on Computer and Communication Security (CCS)
, pp. 9-17
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
8
-
-
84956984263
-
Time-stamping with binary linking schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Buldas, A., Laud, P., Lipmaa, H., Villemson, J.: Time-stamping with binary linking schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 486-501. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 486-501
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
9
-
-
33645986453
-
-
Buldas, A., Laud, P., Saarepera, M., Villemson, J.: Universally composable timestamping schemes with audit. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 359-373. Springer, Heidelberg (2005)
-
Buldas, A., Laud, P., Saarepera, M., Villemson, J.: Universally composable timestamping schemes with audit. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 359-373. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
84957803060
-
-
Buldas, A., Laud, P., Schoenmakers, B.: Optimally efficient accountable timestamping. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 293-305. Springer, Heidelberg (2000)
-
Buldas, A., Laud, P., Schoenmakers, B.: Optimally efficient accountable timestamping. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 293-305. Springer, Heidelberg (2000)
-
-
-
-
11
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
70350370681
-
-
Cohen, W.: Enron email dataset, http://www.cs.cmu.edu/̃enron
-
Cohen, W.: Enron email dataset, http://www.cs.cmu.edu/̃enron
-
-
-
-
14
-
-
0024606010
-
Making data structures persistent
-
Driscoll, J.R., Sarnak, N., Sleator, D.D., Tarjan, R.E.: Making data structures persistent. Journal of Computer and System Sciences 38(1), 86-124 (1989)
-
(1989)
Journal of Computer and System Sciences
, vol.38
, Issue.1
, pp. 86-124
-
-
Driscoll, J.R.1
Sarnak, N.2
Sleator, D.D.3
Tarjan, R.E.4
-
15
-
-
70350401080
-
-
EMC, Centera Compliance Edition Plus, http://www.emc.com/products/detail/ hardware/centera-compliance-edition-plus.htm
-
EMC, Centera Compliance Edition Plus, http://www.emc.com/products/detail/ hardware/centera-compliance-edition-plus.htm
-
-
-
-
16
-
-
37149025723
-
-
Goodrich, M., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Demetrescu, C. (ed.) WEA 2007. LNCS, 4525, pp. 94-107. Springer, Heidelberg (2007)
-
Goodrich, M., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Demetrescu, C. (ed.) WEA 2007. LNCS, vol. 4525, pp. 94-107. Springer, Heidelberg (2007)
-
-
-
-
17
-
-
56649103630
-
Athos: Efficient authentication of outsourced file systems
-
ISC, pp
-
Goodrich, M., Papamanthou, C., Tamassia, R., Triandopoulos, N.: Athos: Efficient authentication of outsourced file systems. In: Proc. Information Security Conference (ISC), pp. 80-96 (2008)
-
(2008)
Proc. Information Security Conference
, pp. 80-96
-
-
Goodrich, M.1
Papamanthou, C.2
Tamassia, R.3
Triandopoulos, N.4
-
18
-
-
0141873829
-
Efficient authenticated dictionaries with skip lists and commutative hashing
-
Johns Hopkins Information Security Institute
-
Goodrich, M., Tamassia, R.: Efficient authenticated dictionaries with skip lists and commutative hashing. technical report, Johns Hopkins Information Security Institute (1991), http://www.cs.jhu.edu/̃goodrich/cgc/pubs/ hashskip.pdf
-
(1991)
technical report
-
-
Goodrich, M.1
Tamassia, R.2
-
19
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
Bertrand, G, Imiya, A, Klette, R, eds, Digital and Image Geometry, Springer, Heidelberg
-
Goodrich, M., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Bertrand, G., Imiya, A., Klette, R. (eds.) Digital and Image Geometry. LNCS, vol. 2243, pp. 372-388. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2243
, pp. 372-388
-
-
Goodrich, M.1
Tamassia, R.2
Hasic, J.3
-
20
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
IEEE Press, Los Alamitos
-
Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DARPA Information Survivability Conference and Exposition II (DISCEX II), pp. 68-82. IEEE Press, Los Alamitos (1991)
-
(1991)
DARPA Information Survivability Conference and Exposition II (DISCEX
, vol.2
, pp. 68-82
-
-
Goodrich, M.1
Tamassia, R.2
Schwerin, A.3
-
21
-
-
0025849585
-
How to time-stamp a digital document
-
Haber, S., Stornetta, W.S.: How to time-stamp a digital document. Journal of Cryptology 3(2), 99-111 (1991)
-
(1991)
Journal of Cryptology
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
22
-
-
84897368274
-
CIS: Content immutable storage for trustworthy record keeping
-
IEEE Computer Society Press, Los Alamitos
-
Huang, L., Hsu, W.W., Zheng, F.: CIS: Content immutable storage for trustworthy record keeping. In: Proc. of the Conference on Mass Storage Systems and Technologies (MSST). IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proc. of the Conference on Mass Storage Systems and Technologies (MSST)
-
-
Huang, L.1
Hsu, W.W.2
Zheng, F.3
-
24
-
-
70350367068
-
-
Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, 1465, pp. 951-980. Springer, Heidelberg (1998)
-
Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 951-980. Springer, Heidelberg (1998)
-
-
-
-
25
-
-
70350361884
-
Databank: An economics based privacy preserving system for distributing relevant advertising and content
-
Technical report HPL-2006-95, HP Laboratories
-
Lukose, R.M., Lillibridge, M.: Databank: An economics based privacy preserving system for distributing relevant advertising and content. Technical report HPL-2006-95, HP Laboratories (2006)
-
(2006)
-
-
Lukose, R.M.1
Lillibridge, M.2
-
27
-
-
85084161556
-
Secure history preservation through timeline entanglement
-
USENIX
-
Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: Proc. 11th USENIX Security Symposium, pp. 297-312. USENIX (2002)
-
(2002)
Proc. 11th USENIX Security Symposium
, pp. 297-312
-
-
Maniatis, P.1
Baker, M.2
-
28
-
-
84969346266
-
A cerified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.: A cerified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.1
-
29
-
-
70350365723
-
Zero-knowledge sets
-
IEEE Computer Society Press, Los Alamitos
-
Micali, S., Rabin, M., Kilian, J.: Zero-knowledge sets. In: Proc. 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proc. 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
-
-
Micali, S.1
Rabin, M.2
Kilian, J.3
-
32
-
-
70350361885
-
-
Sion, R.: Strong WORM. In: Proc. of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society Press, Los Alamitos (2008)
-
Sion, R.: Strong WORM. In: Proc. of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society Press, Los Alamitos (2008)
-
-
-
|