Towards a secure logging mechanism for dynamic systems, Proc. of the 7th IT Security Symposium, 2005. ,
Data Retention and Anonymity Services; Proc. The Future of Identity in the Information Society -Challenges for Privacy and Security, FIDIS/IFIP Internet Security & Privacy Fourth International Summer School Advances in Information and Communication Technology, pp.92-106, 2009. ,
DOI : 10.1007/978-3-642-03315-5_7
Web MIXes: A System for Anonymous and Unobservable Internet Access, Proc. of Privacy Enhancing Technologies Workshop, pp.115-129, 2000. ,
DOI : 10.1007/3-540-44702-4_7
Forward integrity for secure audit logs, 1997. ,
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.242, pp.84-88, 1981. ,
Hong: Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of the Workshop on Design Issues in Anonymity and Unobservability, 2000. ,
The Free Haven Project: Distributed Anonymous Storage Service, Proc. of the Workshop on Design Issues in Anonymity and Unobservability, 2000. ,
DOI : 10.1007/3-540-44702-4_5
Syverson: Tor: The Second- Generation Onion Router, Proc. of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Proc. of Progress in Cryptology ? IN- DOCRYPT 2004, pp.343-355, 2005. ,
DOI : 10.1007/978-3-540-30556-9_27
Intel???s New AES Instructions for Enhanced Performance and Security, Proc. Fast Software Encryption, pp.51-66, 2009. ,
DOI : 10.1007/978-3-642-03317-9_4
Logcrypt: forward security and public verification for secure audit logs, Proc. of the 2006 Australasian Workshops on Grid Computing and E- Research, pp.203-211, 2006. ,
A new approach to secure logging, ACM Transactions on Storage (TOS), vol.5, issue.1, 2009. ,
Zuccherato: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP), Proposed Standard, 2001. ,
Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999. ,
DOI : 10.1145/317087.317089
A proposal for an ISO standard for public key encryption; Version 2.1, 2001. ,
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC ; U.S. Department of Commerce, National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL), 2007. ,
Secure and Privacy-Friendly Logging for eGovernment Services, 2008 Third International Conference on Availability, Reliability and Security, pp.1091-1096, 2008. ,
DOI : 10.1109/ARES.2008.41