Author:
Buldas Ahto,Laud Peeter,Lipmaa Helger,Villemson Jan
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. SRC Research Reports 39, DEC's System Research Center, February 1989.
2. Josh Benaloh and Michael de Mare. Efficient Broadcast time-stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science, August 1991.
3. Dave Bayer, Stuart Haber, and W. Scott Stornetta. Improving the efficiency and reliability of digital time-stamping. In Sequences'91: Methods in Communication, Security, and Computer Science, pages 329–334. Springer-Verlag, 1992.
4. Stephen W. Hawking. A Brief History of Time: From the Big Bang to Black Holes. Bantam Books, April 1988.
5. Stuart Haber and W.-Scott Stornetta. How to Time-Stamp a Digital Document. Journal of Cryptology, 3(2):99–111, 1991.
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Time-Stamping;Encyclopedia of Cryptography, Security and Privacy;2024
2. Decentralized Documentation of Maritime Traffic Incidents to Support Conflict Resolution;Journal of Marine Science and Engineering;2022-12-16
3. Central Bank Digital Currency with Asymmetric Privacy;SSRN Electronic Journal;2021
4. Secure Data Time-Stamping;Data Security in Cloud Storage;2020
5. LTA: A Linked Timestamp based Authentication Protocol for Sensor Network;International Journal of Security and Its Applications;2019-12-31