Zipf's law and the internet, Glottometrics, vol.3, pp.143-150, 2002. ,
Merkle tree authentication of HTTP responses, Special interest tracks and posters of the 14th international conference on World Wide Web , WWW '05, pp.1182-1183, 2005. ,
DOI : 10.1145/1062745.1062929
CHRONOS, Proceedings of the 2005 workshop on Secure web services , SWS '05, pp.84-90, 2005. ,
DOI : 10.1145/1103022.1103037
Accountable certificate management using undeniable attestations, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, p.27, 2000. ,
DOI : 10.1145/352600.352604
Authentic Third-Party Data Publication, 14th IFIP 11.3 Working Conference in Database Security, 2000. ,
DOI : 10.1007/0-306-47008-X_9
Power Laws and Rich-Get-Richer Phenomena, Networks, Crowds, and Markets: Reasoning about a Highly Connected World, 2010. ,
DOI : 10.1017/CBO9780511761942.019
Efficient and fresh cerification, Public Key Cryptography, pp.342-353, 2000. ,
Efficient authenticated dictionaries with skip lists and commutative hashing, 2001. ,
Implementation of an authenticated dictionary with skip lists and commutative hashing, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, pp.68-82, 2001. ,
DOI : 10.1109/DISCEX.2001.932160
Network security -private communication in a public world series in computer networking and distributed systems, 1995. ,
A fast algorithm for optimal length-limited Huffman codes, Journal of the ACM, vol.37, issue.3, pp.464-473, 1990. ,
DOI : 10.1145/79147.79150
A tale of the tails: Power-laws in internet measurements, IEEE Network, vol.27, issue.1, pp.59-64, 2013. ,
DOI : 10.1109/MNET.2013.6423193
Protocols for Public Key Cryptosystems, 1980 IEEE Symposium on Security and Privacy, 1982. ,
DOI : 10.1109/SP.1980.10006
A Certified Digital Signature, Proceedings on Advances in Cryptology, pp.218-238, 1990. ,
DOI : 10.1007/0-387-34805-0_21
Certificate revocation and certificate update, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.561-570, 2000. ,
DOI : 10.1109/49.839932
Do websites have increasing returns? http://www.nngroup.com/ articles/do-websites-have-increasing-returns, 1997. ,
A note about page popularity. http://www.nngroup.com/articles/ traffic-log-patterns, 2006. ,
Design of a timestamping system, 1999. ,
Skip lists: A probabilistic alternative to balanced trees, 1990. ,
Theory of Zipf's Law and Beyond. Lecture notes in economics and mathematical systems, 2009. ,
On the cost of authenticated data structures, Proc. European Symp. on Algorithms, pp.2-5, 2003. ,