Cited By
View all- Ali AKhan AAhmed MJeon G(2022)BCALSTransactions on Emerging Telecommunications Technologies10.1002/ett.427233:4Online publication date: 17-Apr-2022
Audit logs are an integral part of modern computer systems due to their forensic value. Protecting audit logs on a physically unprotected machine in hostile environments is a challenging task, especially in the presence of active adversaries. It is ...
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on an untrusted machine in a large distributed system is a challenging task,...
Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE) and identity based encryption (IBE). CBE provides an efficient implicit certificate mechanism to eliminate third-party ...
John Wiley & Sons, Inc.
United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in