1. Bellare M. and Palacio A. 2002. Protecting against key exposure: strongly key-insulated encryption with optimal threshold. In Cryptology ePrint Archive Report 2002/64. Bellare M. and Palacio A. 2002. Protecting against key exposure: strongly key-insulated encryption with optimal threshold. In Cryptology ePrint Archive Report 2002/64.
2. Bellare M. and Yee B. 1997. Forward integrity for secure audit logs. Tech. rep. University of California at San Diego ftp://www.cs.ucsd.edu/pub/bsq/pub/fi.ps. Bellare M. and Yee B. 1997. Forward integrity for secure audit logs. Tech. rep. University of California at San Diego ftp://www.cs.ucsd.edu/pub/bsq/pub/fi.ps.
3. Verifiable audit trails for a versioning file system
4. Chong C. Peng Z. and Hartel P. 2002. Secure audit logging with tamper resistant hardware. In Technical Rep. TR-CTIT-02-29 Centre for Telematics and Information Technology Univ. Twente The Netherlands. Chong C. Peng Z. and Hartel P. 2002. Secure audit logging with tamper resistant hardware. In Technical Rep. TR-CTIT-02-29 Centre for Telematics and Information Technology Univ. Twente The Netherlands.