1. A. Ahmad, S. Lee, and M. Peinado. 2022. HARDLOG: Practical tamper-proof system auditing using a novel audit device. In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022. IEEE, 1791–1807.
2. Security against covert adversaries: Efficient protocols for realistic adversaries;Aumann Y.;Journal of Cryptology,2010
3. S. Avizheh, R. Safavi-Naini, and S. Li. 2019. Secure logging with security against adaptive crash attack. In International Symposium on Foundations & Practice of Security. Toulouse, France. https://arxiv.org/abs/1910.14169
4. M. Bellare and B. S. Yee. 1997. Forward Integrity for Secure Audit Logs. Technical Report. UC San Diego.
5. M. Bellare and B. S. Yee. 2003. Forward-security in private-key cryptography. In Topics in Cryptology - CT-RSA 2003, The Cryptographers’ Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings. 1–18.