Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Practical forward secure sequential aggregate signatures
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A New Approach to Secure Logging
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A new approach to secure logging
ACM Transactions on Storage (TOS)
Logging key assurance indicators in business processes
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
TimeCapsule: secure recording of accesses to a protected datastore
Proceedings of the 1st ACM workshop on Virtual machine security
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
BBox: a distributed secure log architecture
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A framework for secure and verifiable logging in public communication networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
ACM Transactions on Information and System Security (TISSEC)
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Distributed privacy-preserving transparency logging
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We build on prior work by showing how log creation can be separated from log verification, and describing several additional performance and convenience features not previously considered.