A Framework for Secure and Verifiable Logging in Public Communication Networks
暂无分享,去创建一个
Panayiotis Kotzanikolaou | Emmanouil Magkos | Vassilios Stathopoulos | E. Magkos | P. Kotzanikolaou | V. Stathopoulos
[1] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[2] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[3] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[4] H. Shigeno,et al. Efficient log authentication for forensic computing , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[5] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[6] Bruce Schneier,et al. Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.
[7] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[8] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[9] Kai Rannenberg,et al. Security and Privacy in Dynamic Environments , 2006 .
[10] Rafael Accorsi,et al. On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems , 2006, SEC.
[11] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.