1. A new approach to secure logging;Ma;ACM transactions storage,2009
2. Security audit logs to support computer forensics;Schneier;ACM transactions on information system security,1999
3. Forward integrity for secure audit logs. Department of computer science, University of California, San Diego;Bellare;Technical Reports,1997
4. HoltJ. E. Logcrypt: Forward security and public verification for secure audit logs. In proceedings of the 4th australasian information security workshop 2006; 203-211.
5. On the security of public key protocols;Dolev;IEEE transactions on information theory,1983