共 50 条
- [1] A Tamper-evident Ink [J]. TAGA: TECHNICAL ASSOCIATION OF THE GRAPHIC ARTS, 2018, PROCEEDINGS, 2018, : 144 - 149
- [3] Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 881 - 889
- [4] Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 17 - +
- [5] CUSTOS: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
- [7] Brief Announcement: Tamper-Evident Stabilization [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2014, 2014, 8756 : 355 - 358
- [8] EXPANSION CONTINUES IN TAMPER-EVIDENT PACKAGING [J]. PACKAGE ENGINEERING, 1983, 28 (06): : 52 - 54
- [9] Finding the evidence in tamper-evident logs [J]. SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 69 - 75
- [10] Implementing a tamper-evident database system [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 28 - 48