BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems
Audit logs, providing information about the current and past states of systems, are one of the
most important parts of modern computer systems. Providing security for audit logs on an …
most important parts of modern computer systems. Providing security for audit logs on an …
A constant time complexity spam detection algorithm for boosting throughput on rule-based filtering systems
T **. The rising popularity of online shop** among the general …
Implementation of randomize-then-combine constructed hash function
CS Chum, C Jun, X Zhang - 2014 23rd Wireless and Optical …, 2014 - ieeexplore.ieee.org
Hash functions, such as SHA (secure hash algorithm) and MD (message digest) families that
are built upon Merkle-Damgard construction, suffer many attacks due to the iterative nature …
are built upon Merkle-Damgard construction, suffer many attacks due to the iterative nature …
ConcurDB: Concurrent query authentication for outsourced databases
Clients of outsourced databases need Query Authentication (QA) guaranteeing the integrity
and authenticity of query results returned by potentially compromised providers. Prior work …
and authenticity of query results returned by potentially compromised providers. Prior work …
An overview of incremental hash function based on pair block chaining
S Yunling, M **anghua - 2010 International Forum on …, 2010 - ieeexplore.ieee.org
Hash function plays an important role in the area of information security. It is widely used to
provide data integrity, message authentication, digital signature and password protection …
provide data integrity, message authentication, digital signature and password protection …
On the incremental digital signatures
K Atighehchi - 2018 17th IEEE International Conference On …, 2018 - ieeexplore.ieee.org
The purpose of incremental cryptography is to enable updates of cryptographic forms of
documents undergoing modifications, more efficiently than if we had to recompute them from …
documents undergoing modifications, more efficiently than if we had to recompute them from …
[BUCH][B] Authenticated software update
R Ye - 2008 - search.proquest.com
Software update is the process of updating software running on computing devices. It allows
computing devices to download and to install software packages and patches in real time …
computing devices to download and to install software packages and patches in real time …