Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
A two-level time-stamping system
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Eliminating counterevidence with applications to accountable certificate management
Journal of Computer Security
Improving the Availability of Time-Stamping Services
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
On Optimal Hash Tree Traversal for Interval Time-Stamping
ISC '02 Proceedings of the 5th International Conference on Information Security
Towards an XML format for time-stamps
Proceedings of the 2002 ACM workshop on XML security
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems
Proceedings of the 2005 workshop on Secure web services
SE'07 Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering
Advanced Internet Based Systems and Applications
On Universal Composable Security of Time-Stamping Protocols
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Design requirements for a secure time-stamping scheme
EuroIMSA '08 Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications
Authentic time-stamps for archival storage
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Super-efficient aggregating history-independent persistent authenticated dictionaries
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Integrating XML linked time-stamps in OASIS digital signature services
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Proving properties of incremental merkle trees
CADE' 20 Proceedings of the 20th international conference on Automated Deduction
A new timestamping scheme based on skip lists
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Secure event logging in sensor networks
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Secure accumulators from euclidean rings without trusted setup
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Publicly verifiable proofs of sequential work
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Secure event logging in sensor networks
Computers & Mathematics with Applications
Hi-index | 0.00 |