共 50 条
- [1] Universally composable time-stamping schemes with audit INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 359 - 373
- [2] Study on the Security of Time-Stamping Service Architecture ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 28 - +
- [5] Time-Stamping Authority Grid CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 98 - 105
- [6] THE NEED FOR DIGITAL TIME-STAMPING ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1993, 206 : 46 - CINF
- [7] Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 318 - 335
- [8] A survey of the problems of time-stamping or why it is necessary to have another time-stamping scheme PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2007, : 341 - +
- [9] Do broken hash functions affect the security of time-stamping schemes? APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 50 - 65