共 50 条
- [42] Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 318 - 335
- [43] A cost effective solution for time-stamping electronic warfare system response 2006 IEEE AUTOTESTCON, VOLS 1 AND 2, 2006, : 140 - 144
- [44] Design of color-code system for time-stamping broadcast video ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, : 238 - 239
- [46] Offline Time-Stamping Using TPM and Its Java']Java Library 2012 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2012), 2012,
- [47] Do broken hash functions affect the security of time-stamping schemes? APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 50 - 65
- [48] A group-based time-stamping scheme for the preservation of group intentions DISTRIBUTED COMMUNITIES ON THE WEB, 2002, 2468 : 125 - 137
- [49] The real estate time-stamping and registration system based on Ethereum blockchain BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
- [50] An efficient time-stamping solution for long-term digital archiving 2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,