Back to Results
First PageMeta Content
Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security


1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science
Add to Reading List

Document Date: 2011-11-09 13:25:58


Open Document

File Size: 323,77 KB

Share Result on Facebook

City

New York / London / KKKKK / /

Company

G. kG / Cambridge University Press / Australian Computer Society Inc. / NCSU Secure Open Systems / Intel / Shamus Software / /

Country

United States / Australia / United Kingdom / /

/

Facility

MIRACL library / Computer Science North Carolina State University / /

Holiday

Assumption / /

IndustryTerm

forward secure and aggregate audit / generation algorithm / tamper resistant hardware / communications security / virtual computing cloud / aggregate signature verification algorithm / e-research / continuous real-time log verifiers / possible solutions / update algorithm / large distributed systems / implantable medical devices / aggregate signature generation algorithm / virtual computing clouds / wireless sensors / real-life applications / computer systems / encrypted search / secure audit / er algorithm / continuous end-to-end real-time communication / actual algorithms / tamper-resistant hardware / secure audit logging applications / implantable devices / bug-free tamper-resistant hardware / computing / security in computer systems / computer communications / continuous real-time communication / using a bug-free tamper-resistant hardware / /

NaturalFeature

K. Fall / /

OperatingSystem

Windows XP / /

Organization

Cambridge University / U.S. Army Research Office / U.S. Government / U.S. National Science Foundation / Peng Ning Department of Computer Science North Carolina State University Raleigh / USENIX Association / Australian Computer Society / Trusted Third Party / /

Person

Bt / Attila A. Yavuz / /

Position

low logger / model / the same logger / BlindAggregate-Forward / logger / Blind-Aggregate-Forward / /

ProgrammingLanguage

Visual C++ / L / /

Technology

RAM / AV / actual algorithms / Aggregate Signature Verification algorithms / private key / secret key / BAF algorithms / BAF.AV er algorithm / aggregate signature generation algorithm / Encryption / Cryptography / key generation algorithm / Public Key / aggregate signature verification algorithm / Key Update algorithm / digital signature / generic BAF algorithms / /

URL

http /

SocialTag