Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
A two-level time-stamping system
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Eliminating counterevidence with applications to accountable certificate management
Journal of Computer Security
Improving the Availability of Time-Stamping Services
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
Efficient Long-Term Validation of Digital Signatures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
On Optimal Hash Tree Traversal for Interval Time-Stamping
ISC '02 Proceedings of the 5th International Conference on Information Security
Towards an XML format for time-stamps
Proceedings of the 2002 ACM workshop on XML security
Defining security services for electronic tendering
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
On the design of time-stamped signatures
Journal of Computer and System Sciences
Enabling the Archival Storage of Signed Documents
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems
Proceedings of the 2005 workshop on Secure web services
Linked authenticated dictionaries for certificate status verification
Enhanced methods in computer security, biometric and artificial intelligence systems
Security of the design of time-stamped signatures
Journal of Computer and System Sciences
Long-term trusted preservation service using service interaction protocol and evidence records
Computer Standards & Interfaces
Strong accountability for network storage
ACM Transactions on Storage (TOS)
Designing a secure e-tender submission protocol
Electronic Commerce Research
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Advanced Internet Based Systems and Applications
On Universal Composable Security of Time-Stamping Protocols
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Design requirements for a secure time-stamping scheme
EuroIMSA '08 Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications
Authentic time-stamps for archival storage
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Enabling the archival storage of signed documents
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
A web services based architecture for digital time stamping
Journal of Web Engineering
A secure e-tender submission protocol
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Designing secure e-tendering systems
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Universally composable time-stamping schemes with audit
ISC'05 Proceedings of the 8th international conference on Information Security
A new timestamping scheme based on skip lists
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Secure event logging in sensor networks
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Secure accumulators from euclidean rings without trusted setup
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Publicly verifiable proofs of sequential work
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Secure event logging in sensor networks
Computers & Mathematics with Applications
Hi-index | 0.00 |