-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Springer
-
Anagnostopoulos, A., Goodrich, M. T., and Tamassia, R. Persistent Authenticated Dictionaries and Their Applications. In Proceedings of the Information Security Conference (ISC 2001) (Malaga, Spain, Oct. 2001), vol. 2200 of Lecture Notes in Computer Science, Springer, pp. 379–393.
-
Proceedings of the Information Security Conference (ISC 2001) (Malaga, Spain, Oct. 2001), Vol. 2200 of Lecture Notes in Computer Science
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
2
-
-
84958743342
-
Improving the availability of time-stamping services
-
Sydney, Australia, July
-
Ansper, A., Buldas, A., Saarepera, M., and Willemson, J. Improving the Availability of Time-Stamping Services. In Proccedings of the 6th Australasian Conference on Information and Privacy (ACISP 2001) (Sydney, Australia, July 2001).
-
(2001)
Proccedings of the 6th Australasian Conference on Information and Privacy (ACISP 2001)
-
-
Ansper, A.1
Buldas, A.2
Saarepera, M.3
Willemson, J.4
-
3
-
-
0015475519
-
Symmetric binary b-trees: Data structure and maintenance algorithms
-
Bayer, R. Symmetric binary B-trees: Data structure and maintenance algorithms. Acta Informatica 1 (1972), 290–306.
-
(1972)
Acta Informatica
, vol.1
, pp. 290-306
-
-
Bayer, R.1
-
4
-
-
0015489880
-
Organization and maintenance of large ordered indexes
-
Bayer, R., and McCreight, E. M. Organization and Maintenance of Large Ordered Indexes. Acta Informatica 1, 3 (1972), 173–189.
-
(1972)
Acta Informatica
, vol.1
, Issue.3
, pp. 173-189
-
-
Bayer, R.1
McCreight, E.M.2
-
5
-
-
0141873837
-
-
Tech. Rep. TR-MCS-91-1, Clarkson University, Department of Mathematics and Computer Science, Apr
-
Benaloh, J., and de Mare, M. Efficient Broadcast Time-stamping. Tech. Rep. TR-MCS-91-1, Clarkson University, Department of Mathematics and Computer Science, Apr. 1991.
-
(1991)
Efficient Broadcast Time-Stamping
-
-
Benaloh, J.1
de Mare, M.2
-
6
-
-
0034449541
-
Accountable certificate management using undeniable attestations
-
Athens, Greece, Nov
-
Buldas, A., Laud, P., and Lipmaa, H. Accountable Certificate Management using Undeniable Attestations. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS 2000) (Athens, Greece, Nov. 2000), pp. 9–17.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS 2000)
, pp. 9-17
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
7
-
-
0036312254
-
Eliminating counterevidence with applications to accountable certificate management
-
To appear
-
Buldas, A., Laud, P., and Lipmaa, H. Eliminating Counterevidence with Applications to Accountable Certificate Management. Jounal of Computer Security (2002). To appear.
-
(2002)
Jounal of Computer Security
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
8
-
-
84956984263
-
Time-stamping with binary linking schemes
-
Springer
-
Buldas, A., Laud, P., Lipmaa, H., and Villemson, J. Time-stamping with Binary Linking Schemes. In Advances on Cryptology (CRYPTO 1998) (Santa Barbara, USA, Aug. 1998), H. Krawczyk, Ed., vol. 1462 of Lecture Notes in Computer Science, Springer, pp. 486–501.
-
Advances on Cryptology (CRYPTO 1998) (Santa Barbara, USA, Aug. 1998), H. Krawczyk, Ed., Vol. 1462 of Lecture Notes in Computer Science
, pp. 486-501
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
9
-
-
0004116989
-
-
McGraw-Hill
-
Cormen, T. H., Leiserson, C. E., and Rivest, R. L. Introduction to Algorithms, first ed. McGraw-Hill, 1989.
-
(1989)
Introduction to Algorithms, First Ed.
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
10
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
Anaheim, CA, USA, June
-
Goodrich, M. T., Tamassia, R., and Schwerin, A. Implementation of an Authenticated Dictionary with Skip Lists and Commutative Hashing. In 2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001) (Anaheim, CA, USA, June 2001).
-
(2001)
2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001)
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
11
-
-
0025849585
-
How to time-stamp a digital document
-
Haber, S., and Stornetta, W. S. How to Time-stamp a Digital Document. Journal of Cryptology: the Journal of the International Association for Cryptologic Research 3, 2 (1991), 99–111.
-
(1991)
Journal of Cryptology: The Journal of the International Association for Cryptologic Research
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
14
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
July
-
Lamport, L. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM 21, 7 (July 1978), 558–565.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
15
-
-
84976699318
-
The byzantine generals problem
-
July
-
Lamport, L., Shostak, R., and Pease, M. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4, 3 (July 1982), 382–401.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
16
-
-
85084162796
-
Enabling the archival storage of signed documents
-
Monterey, CA, USA, Jan. USENIX Association
-
Maniatis, P., and Baker, M. Enabling the Archival Storage of Signed Documents. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2002) (Monterey, CA, USA, Jan. 2002), USENIX Association, pp. 31–45.
-
(2002)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2002)
, pp. 31-45
-
-
Maniatis, P.1
Baker, M.2
-
17
-
-
84920380941
-
Protocols for public key cryptosystems
-
Oakland, CA, U.S.A., Apr. IEEE Computer Society
-
Merkle, R. C. Protocols for Public Key Cryptosystems. In Proceedings of the 1980 Symposium on Security and Privacy (Oakland, CA, U.S.A., Apr. 1980), IEEE Computer Society, pp. 122–133.
-
(1980)
Proceedings of the 1980 Symposium on Security and Privacy
, pp. 122-133
-
-
Merkle, R.C.1
-
18
-
-
85084162561
-
Certificate revocation and certificate update
-
San Antonio, TX, USA, Jan
-
Naor, M., and Nissim, K. Certificate Revocation and Certificate Update. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, USA, Jan. 1998), pp. 217–228.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
20
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
June
-
Pugh, W. Skip Lists: a Probabilistic Alternative to Balanced Trees. Communications of the ACM 33, 6 (June 1990), 668–676.
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
21
-
-
84904263584
-
-
Technical Report WP2, Université Catholique de Lou-vain
-
Quisquater, J. J., Massias, H., Avilla, J. S., Preneel, B., and Van Rompay, B. TIMESEC: Specification and Implementation of a Timestamping System. Technical Report WP2, Université Catholique de Lou-vain, 1999.
-
(1999)
TIMESEC: Specification and Implementation of A Timestamping System
-
-
Quisquater, J.J.1
Massias, H.2
Avilla, J.S.3
Preneel, B.4
van Rompay, B.5
-
22
-
-
0034775826
-
A scalable content-addressable network
-
San Diego, CA, U.S.A., Aug. ACM SIGCOMM
-
Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S. A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM Symposium on Communication, Architecture, and Protocols (San Diego, CA, U.S.A., Aug. 2001), ACM SIGCOMM, pp. 161–172.
-
(2001)
Proceedings of the ACM SIGCOMM Symposium on Communication, Architecture, and Protocols
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
23
-
-
85084161255
-
Cryptographic support for secure logs on untrusted machines
-
San Antonio, TX, USA, Jan
-
Schneier, B., and Kelsey, J. Cryptographic Support for Secure Logs on Untrusted Machines. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, USA, Jan. 1998), pp. 53–62.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 53-62
-
-
Schneier, B.1
Kelsey, J.2
-
24
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, U.S.A., Aug. ACM SIGCOMM
-
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM Symposium on Communication, Architecture, and Protocols (San Diego, CA, U.S.A., Aug. 2001), ACM SIGCOMM, pp. 149–160.
-
(2001)
Proceedings of the ACM SIGCOMM Symposium on Communication, Architecture, and Protocols
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
|