Author:
Yavuz Attila A.,Ning Peng,Reiter Michael K.
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Lecture Notes in Computer Science;M. Abdalla,2000
2. Anderson, R.: Two remarks on public-key cryptology, invited lecture. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (CCS 1997) (1997)
3. Lecture Notes in Computer Science;M. Bellare,1997
4. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS 1993), pp. 62–73. ACM, NY (1993)
5. Lecture Notes in Computer Science;M. Bellare,1997
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. Forward Security with Crash Recovery for Secure Logs;ACM Transactions on Privacy and Security;2023-12-12
3. Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain;Mobile Networks and Applications;2023-07-06
4. Forensics with IoT Based Systems’ Evidences: A Futuristic Review on Forensic and IoT Frameworks;Advances in Systems Engineering;2023
5. SealFSv2: combining storage-based and ratcheting for tamper-evident logging;International Journal of Information Security;2022-12-06