共 50 条
- [1] On Fast Verification of Hash Chains TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 382 - 396
- [2] Fast verification of hash chains TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 339 - 352
- [3] Hash chains with diminishing ranges for sensors 2004 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2004, : 77 - 83
- [4] Infinite length hash chains and their applications WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 57 - 61
- [5] Hash Chains to Secure Proactive Protocols 16TH COMMUNICATIONS AND NETWORKING SYMPOSIUM (CNS 2013) - 2013 SPRING SIMULATION MULTI-CONFERENCE (SPRINGSIM'13), 2013, 45 (03): : 62 - 68
- [6] Self-updating hash chains and their implementations WEB INFORMATION SYSTEMS - WISE 2006, PROCEEDINGS, 2006, 4255 : 387 - 397
- [9] Data Authentication for NDN Using Hash Chains 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 982 - 987