R. Accorsi, Towards a secure logging mechanism for dynamic systems, Proc. of the 7th IT Security Symposium, 2005.

S. Berthold, R. Böhme, and S. Köpsell, Data Retention and Anonymity Services; Proc. The Future of Identity in the Information Society -Challenges for Privacy and Security, FIDIS/IFIP Internet Security & Privacy Fourth International Summer School Advances in Information and Communication Technology, pp.92-106, 2009.
DOI : 10.1007/978-3-642-03315-5_7

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Proc. of Privacy Enhancing Technologies Workshop, pp.115-129, 2000.
DOI : 10.1007/3-540-44702-4_7

M. Bellare and B. S. Yee, Forward integrity for secure audit logs, 1997.

D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.242, pp.84-88, 1981.

I. Clarke, O. Sandberg, B. Wiley, and W. Theodore, Hong: Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of the Workshop on Design Issues in Anonymity and Unobservability, 2000.

R. Dingledine, M. J. Freedman, and D. Molnar, The Free Haven Project: Distributed Anonymous Storage Service, Proc. of the Workshop on Design Issues in Anonymity and Unobservability, 2000.
DOI : 10.1007/3-540-44702-4_5

R. Dingledine, N. Mathewson, and F. Paul, Syverson: Tor: The Second- Generation Onion Router, Proc. of the 13th USENIX Security Symposium, pp.303-320, 2004.

D. A. Mcgrew and J. Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Proc. of Progress in Cryptology ? IN- DOCRYPT 2004, pp.343-355, 2005.
DOI : 10.1007/978-3-540-30556-9_27

S. Gueron, Intel???s New AES Instructions for Enhanced Performance and Security, Proc. Fast Software Encryption, pp.51-66, 2009.
DOI : 10.1007/978-3-642-03317-9_4

J. E. Holt, Logcrypt: forward security and public verification for secure audit logs, Proc. of the 2006 Australasian Workshops on Grid Computing and E- Research, pp.203-211, 2006.

D. Ma and G. Tsudik, A new approach to secure logging, ACM Transactions on Storage (TOS), vol.5, issue.1, 2009.

]. C. Adams, P. Cain, D. Pinkas, and R. , Zuccherato: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP), Proposed Standard, 2001.

B. Schneier and J. Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999.
DOI : 10.1145/317087.317089

V. Shoup, A proposal for an ISO standard for public key encryption; Version 2.1, 2001.

M. Dworkin, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC ; U.S. Department of Commerce, National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL), 2007.

K. Wouters, K. Simoens, D. Lathouwers, and B. Preneel, Secure and Privacy-Friendly Logging for eGovernment Services, 2008 Third International Conference on Availability, Reliability and Security, pp.1091-1096, 2008.
DOI : 10.1109/ARES.2008.41