Accountable Certificate Management Using Undeniable Attestations (2000)

Cached

Download Links

by Ahto Buldas , Peeter Laud , Helger Lipmaa
Venue:COMPUTER AND COMMUNICATIONS SECURITY
Citations:39 - 3 self

Active Bibliography

27 Eliminating Counterevidence with Applications to Accountable Certificate Management – Ahto Buldas, Peeter Laud, Helger Lipmaa - 2002
Certificate Management Using Undeniable Status Attestations (Submitted Version) – Ahto Buldas, Peeter Laud, Helger Lipmaa - 2000
2 Proof of Freshness: How to efficiently use on online single secure clock to secure shared untrusted memory – Marten Van Dijk, Luis F. G. Sarmenta, Charles W. O’donnell, Srinivas Devadas - 2006
Efficient Tamper-Evident Data Structures for Untrusted Servers – Scott Alexander Crosby - 2009
An Efficient Dynamic and Distributed RSA Accumulator – Michael T. Goodrich, Roberto Tamassia, Jasminka Hasić - 905
40 An Efficient Dynamic and Distributed Cryptographic Accumulator – Michael Goodrich, Roberto Tamassia, Jasminka Hasic - 2002
3 Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica – Michael T. Goodrich, Roberto Tamassia, Nikos Tri - 2010
2 Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS – Marten Van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, Srinivas Devadas - 2007
27 Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing – Michael T. Goodrich, Roberto Tamassia - 2001
18 Efficient data structures for tamper-evident logging – Scott A. Crosby, Dan S. Wallach - 2009
6 Super-efficient Aggregating History-independent Persistent Authenticated Dictionaries – Scott A. Crosby, Dan S. Wallach
5 Authentic Time-Stamps for Archival Storage – Alina Oprea, Kevin D. Bowers
2 1 Authenticated dictionaries: Real-world costs and – Scott A Crosby, Dan S. Wallach - 2010
8 On Optimal Hash Tree Traversal for Interval Time-Stamping – Helger Lipmaa - 2002
57 Persistent Authenticated Dictionaries and Their Applications – Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia - 2001
6 On the Cost of Persistence and Authentication in Skip Lists – Micheal T. Goodrich, Charalampos Papamanthou, Roberto Tamassia
58 Certificate-Based Encryption and the Certificate Revocation Problem – Craig Gentry - 2003
Paper Summaries – Petros Maniatis - 2004
3 Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure – Albert Levi, M. Ufuk Caglayan