Back to Results
First PageMeta Content
Cyberwarfare / Mathematics / Schnorr signature / NP / Digital signature / RSA / Public-key cryptography / Cryptography / Applied mathematics


Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University
Add to Reading List

Document Date: 2012-06-07 15:20:20


Open Document

File Size: 201,84 KB

Share Result on Facebook

Company

LogFAS / /

Currency

USD / /

/

Facility

North Carolina State University / Computer Science University of North Carolina / Chapel Hill Chapel Hill / /

IndustryTerm

computation-intensive applications / generation algorithm / tamper resistant hardware / online trusted server support / signature verification algorithm / sub-linear search / public auditing / verification algorithm / verifiable forward-secure / Online Public Verifiability Offline Server / envisioned secure audit logging applications / recursive subset search strategy / remote trusted server / financial auditing applications / Online Trusted Server / wireless sensors / sublinear search properties / computer systems / secure audit / e-voting / signature generation algorithm / subset search / /

Organization

Peng Ning Michael K. Reiter Department of Computer Science / Computer Science University / Financial Services Authority / A FSA / North Carolina State University Raleigh / FSA / LogFAS PKC / University of North Carolina / Chapel Hill / European Union / Key Generation Center / /

Person

Michael K. Reiter / Attila A. Yavuz / /

Position

same logger / logger / /

Product

Schnorr / /

Technology

signature generation algorithm / three algorithms / private key / Cryptography / appendonly signing algorithm / Key generation algorithm / Public Key / verification algorithm / signature verification algorithm / /

SocialTag