1. Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Trans. Inf. Theory 48(6), 1668–1680 (2002)
2. Bayer, D., Haber, S., Stornetta, W.S.: Improving the efficiency and reliability of digital timestamping. In: Capocelli, R., Santis, A.D., Vaccaro, U. (eds.) Sequences91: Methods in Communication, Security and Computer Science, pp. 329–334. Springer, New York (1992)
3. Lecture Notes in Computer Science;JC Benaloh,1994
4. Ben Shil, A., Blibech, K., Robbana, R.: A new timestamping schema in the bounded storage model. In: Proceedings of the 3rd Conference on Risks and Security of Internet and Systems, CRiSIS (2008)
5. Ben Shil, A., Blibech, K., Robbana, R.: A timestamping scheme with eternal security in the bounded storage model. In: Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference (2014)