Untraceable Electronic Cash, Lecture Notes in Computer Science, vol.403, pp.319-327, 1990. ,
DOI : 10.1007/0-387-34799-2_25
Forward integrity for secure audit logs, 1997. ,
Forward-Security in Private-Key Cryptography, Topics in Cryptology ? CT-RSA 2003. Volume 2612 of Lecture Notes in Computer Science, pp.1-18, 2003. ,
DOI : 10.1007/3-540-36563-X_1
Cryptographic support for secure logs on untrusted machines, Proceedings of the 7th Conference on USENIX Security Symposium - Volume 7. SSYM'98, pp.4-4, 1998. ,
How to time-stamp a digital document, Journal of Cryptology, vol.3, issue.2, pp.99-111, 1991. ,
Designing Log Architectures for Legal Evidence, 2010 8th IEEE International Conference on Software Engineering and Formal Methods, pp.156-165, 2010. ,
DOI : 10.1109/SEFM.2010.29
Log Design for Accountability, 2013 IEEE Security and Privacy Workshops, pp.1-7, 2013. ,
DOI : 10.1109/SPW.2013.26
URL : https://hal.archives-ouvertes.fr/hal-00799100
Hippocratic Databases, Proceedings of the 28th international conference on Very Large Data Bases, VLDB Endowment, pp.143-154, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Transparent government, not transparent citizens: a report on privacy and transparency for the cabinet office, 2011. ,
Distributed privacy-preserving transparency logging, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.83-94, 2013. ,
DOI : 10.1145/2517840.2517847
D:D-5.2 User-Centric Transparency Tools, p.4, 2014. ,
Accountable privacy supporting services, Identity in the Information Society, vol.4, issue.3, pp.241-267, 2009. ,
DOI : 10.1007/BF00196725
Privacy-respecting intrusion detection, 2007. ,
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring, Cryptology and Network Security, pp.261-273, 2005. ,
DOI : 10.1007/11599371_22
Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity, Proceedings of SSZ. Volume Lecture Notes in Informatics, no. P-62., GI SIGs SIDAR and PET, pp.221-232, 2005. ,
Adding Secure Transparency Logging to the PRIME Core, Privacy and Identity Management for Life IFIP Advances in Information and Communication Technology, pp.299-314, 2010. ,
DOI : 10.1007/978-3-642-14282-6_25
URL : https://hal.archives-ouvertes.fr/hal-01061061
Evidence for accountable cloud computing services, Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), Citeseer, 2013. ,
Critical capabilities for security information and event management technology, Gartner Report, 2011. ,
Cryptography: an introduction, 2003. ,
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Public Key Cryptography ? PKC 2011, pp.53-70, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, Theory of Cryptography, pp.422-439, 2012. ,
DOI : 10.1007/978-3-642-28914-9_24
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption, Cryptology ePrint Archive Report, vol.2012437, 2012. ,
DOI : 10.1007/978-3-642-32009-5_13
Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006. ,
DOI : 10.1145/1127345.1127346
Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.185-194, 2007. ,
DOI : 10.1145/1315245.1315269
Conditional proxy reencryption secure against chosen-ciphertext attack, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp.322-332, 2009. ,
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security, pp.151-166, 2009. ,
DOI : 10.1007/3-540-44598-6_14
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, Advances in Cryptology ? EUROCRYPT, pp.316-334, 2000. ,
DOI : 10.1007/3-540-45539-6_22