-
2
-
-
0036312254
-
Eliminating counterevidence with applications to accountable certificate management
-
A. Buldas, P. Laud, and H. Lipmaa. Eliminating Counterevidence with Applications to Accountable Certificate Management. Jounal of Computer Security, 10(3):273-296, 2002.
-
(2002)
Jounal of Computer Security
, vol.10
, Issue.3
, pp. 273-296
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
3
-
-
84956984263
-
Time-stamping with binary linking schemes
-
H. Krawczyk, editor, Santa Barbara, USA, Aug. Springer
-
A. Buldas, P. Laud, H. Lipmaa, and J. Villemson. Time-stamping with Binary Linking Schemes. In H. Krawczyk, editor, Advances on Cryptology (CRYPTO 1998), volume 1462 of Lecture Notes in Computer Science, pages 486-501, Santa Barbara, USA, Aug. 1998. Springer.
-
(1998)
Advances on Cryptology (CRYPTO 1998), Volume 1462 of Lecture Notes in Computer Science
, pp. 486-501
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
7
-
-
0003618065
-
-
Sept
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC 2693: SPKI certificate theory, Sept. 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
84882760238
-
How do digital time-stamps support digital signatures?
-
Autumn
-
S. Haber, B. Kaliski, and S. Stornetta. How do Digital Time-stamps Support Digital Signatures? CryptoBytes, RSA Laboratories, 1(3):14-15, Autumn 1995.
-
(1995)
CryptoBytes, RSA Laboratories
, vol.1
, Issue.3
, pp. 14-15
-
-
Haber, S.1
Kaliski, B.2
Stornetta, S.3
-
10
-
-
77953070914
-
-
Sept. Internet Draft, work in progress, Internet Engineering Task Force
-
T. Kindberg and S. Hawke. The "tag" URI scheme and URN namespace. http://www.ietf.org/internet-drafts/draft-kindberg-tag-uri-04.txt, Sept. 2002. Internet Draft, work in progress, Internet Engineering Task Force.
-
(2002)
The "tag" URI Scheme and URN Namespace
-
-
Kindberg, T.1
Hawke, S.2
-
12
-
-
84944461484
-
IdentiScape: Tackling the personal online identity crisis
-
Computer Systems Laboratory, Stanford University, Stanford, CA, USA, June
-
P. Maniatis and M. Baker. IdentiScape: Tackling the Personal Online Identity Crisis. Technical Report CSL-TR-00-804, Computer Systems Laboratory, Stanford University, Stanford, CA, USA, June 2000.
-
(2000)
Technical Report CSL-TR-00-804
-
-
Maniatis, P.1
Baker, M.2
-
13
-
-
85084162796
-
Enabling the archival storage of signed documents
-
Monterey, CA, USA, Jan. USENIX Association
-
P. Maniatis and M. Baker. Enabling the Archival Storage of Signed Documents. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2002), pages 31-45, Monterey, CA, USA, Jan. 2002. USENIX Association.
-
(2002)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2002)
, pp. 31-45
-
-
Maniatis, P.1
Baker, M.2
-
14
-
-
85084161556
-
Secure history preservation through timeline entanglement
-
San Francisco, CA, USA, Aug
-
P. Maniatis and M. Baker. Secure History Preservation Through Timeline Entanglement. In Proceedings of the 11th USENIX Security Symposium, pages 297-312, San Francisco, CA, USA, Aug. 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 297-312
-
-
Maniatis, P.1
Baker, M.2
-
15
-
-
84944461485
-
-
Apr. Internet Draft, work in progress, Internet Engineering Task Force
-
L. Masinter. "duri" and "tdb" URN name-spaces based on dated URIs. http://www.ietf.org/internet-drafts/draft-masinter-dated-uri-03.txt, Apr. 2002. Internet Draft, work in progress, Internet Engineering Task Force.
-
(2002)
"Duri" and "tdb" URN Name-spaces Based on Dated URIs
-
-
Masinter, L.1
-
23
-
-
85094678972
-
Person-level routing in the mobile people architecture
-
Boulder, CO, USA, Oct. USENIX Association
-
M. Roussopoulos, P. Maniatis, E. Swierk, K. Lai, G. Appenzeller, and M. Baker. Person-level Routing in the Mobile People Architecture. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, pages 165-176, Boulder, CO, USA, Oct. 1999. USENIX Association.
-
(1999)
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems
, pp. 165-176
-
-
Roussopoulos, M.1
Maniatis, P.2
Swierk, E.3
Lai, K.4
Appenzeller, G.5
Baker, M.6
|