1. Andersson M, Nilsson A (2014) Improving integrity assurances of log entries from the perspective of intermittently disconnected devices. MECS-2014-10
2. Bellare M, Yee B (1997) Forward integrity for secure audit logs. Tech Rep. University of California Press, San Diego
3. Choi Y-S, Kim I-K (2013) Software integrity authentication with trusted third-party party. Res Notes Inf Sci.
https://doi.org/10.4156/rnis.vol14.18
4. Holt JE (2006) Logcrypt: forward security and public verification for secure audit logs. In: Proceedings of the 2006 Australasian workshops on grid computing and E-research, vol 54. Australian Computer Society, Inc. Darlinghurst, Australia, pp 203–211
5. Im H, Kang J, Park JH (2015) Certificateless based public key infrastructure using a DNSSEC. J Converg 6(3):26–33