메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Secure history preservation through timeline entanglement

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED DATA STRUCTURES; DESIGN AND IMPLEMENTATIONS; DISTRIBUTED SYSTEMS; INDEPENDENT SYSTEMS; LOOSELY COUPLED; PERFORMANCE CHARACTERISTICS; PROCESSING RESOURCES; SERVICE DEVELOPMENT;

EID: 85084161556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (72)

References (25)
  • 3
    • 0015475519 scopus 로고
    • Symmetric binary b-trees: Data structure and maintenance algorithms
    • Bayer, R. Symmetric binary B-trees: Data structure and maintenance algorithms. Acta Informatica 1 (1972), 290–306.
    • (1972) Acta Informatica , vol.1 , pp. 290-306
    • Bayer, R.1
  • 4
    • 0015489880 scopus 로고
    • Organization and maintenance of large ordered indexes
    • Bayer, R., and McCreight, E. M. Organization and Maintenance of Large Ordered Indexes. Acta Informatica 1, 3 (1972), 173–189.
    • (1972) Acta Informatica , vol.1 , Issue.3 , pp. 173-189
    • Bayer, R.1    McCreight, E.M.2
  • 5
    • 0141873837 scopus 로고
    • Tech. Rep. TR-MCS-91-1, Clarkson University, Department of Mathematics and Computer Science, Apr
    • Benaloh, J., and de Mare, M. Efficient Broadcast Time-stamping. Tech. Rep. TR-MCS-91-1, Clarkson University, Department of Mathematics and Computer Science, Apr. 1991.
    • (1991) Efficient Broadcast Time-Stamping
    • Benaloh, J.1    de Mare, M.2
  • 7
    • 0036312254 scopus 로고    scopus 로고
    • Eliminating counterevidence with applications to accountable certificate management
    • To appear
    • Buldas, A., Laud, P., and Lipmaa, H. Eliminating Counterevidence with Applications to Accountable Certificate Management. Jounal of Computer Security (2002). To appear.
    • (2002) Jounal of Computer Security
    • Buldas, A.1    Laud, P.2    Lipmaa, H.3
  • 14
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • July
    • Lamport, L. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM 21, 7 (July 1978), 558–565.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 17
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • Oakland, CA, U.S.A., Apr. IEEE Computer Society
    • Merkle, R. C. Protocols for Public Key Cryptosystems. In Proceedings of the 1980 Symposium on Security and Privacy (Oakland, CA, U.S.A., Apr. 1980), IEEE Computer Society, pp. 122–133.
    • (1980) Proceedings of the 1980 Symposium on Security and Privacy , pp. 122-133
    • Merkle, R.C.1
  • 18
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • San Antonio, TX, USA, Jan
    • Naor, M., and Nissim, K. Certificate Revocation and Certificate Update. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, USA, Jan. 1998), pp. 217–228.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 217-228
    • Naor, M.1    Nissim, K.2
  • 20
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • June
    • Pugh, W. Skip Lists: a Probabilistic Alternative to Balanced Trees. Communications of the ACM 33, 6 (June 1990), 668–676.
    • (1990) Communications of the ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 23
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • San Antonio, TX, USA, Jan
    • Schneier, B., and Kelsey, J. Cryptographic Support for Secure Logs on Untrusted Machines. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, USA, Jan. 1998), pp. 53–62.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 53-62
    • Schneier, B.1    Kelsey, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.