Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Two methods of authenticated positioning
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hi-index | 0.00 |
We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific camera at a specific time and specific place. These protocols require interaction between the camera and base station both before and after a series of images are taken.