BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
暂无分享,去创建一个
[1] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[2] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[3] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[4] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[5] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.
[6] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[7] Craig Gentry,et al. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.
[8] Thomas S. Heydt-Benjamin,et al. s ecurity and p rivacy for Implantable medical Devices Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional goals such as safety and utility. , 2008 .
[9] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Mohammad Umar Siddiqi,et al. Computational complexity and implementation aspects of the incremental hash function , 2003, IEEE Trans. Consumer Electron..
[11] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[12] Bruce Schneier,et al. Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.
[13] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[14] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[15] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[16] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[17] Gene Tsudik,et al. A new approach to secure logging , 2008, TOS.
[18] Gene Tsudik,et al. Forward-Secure Sequential Aggregate Authentication , 2007, IACR Cryptol. ePrint Arch..
[19] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[20] Yi Mu,et al. Compact sequential aggregate signatures , 2007, SAC '07.
[21] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[22] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[23] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[24] Di Ma,et al. Practical forward secure sequential aggregate signatures , 2008, ASIACCS '08.
[25] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[26] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[27] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.