References
- A. A. Chuvakin, K. J. Schmidt and C. Phillips, Logging and Log Management, Elsevier, 2013.
- K. Malasri and L. Wang, "Securing Wireless Implantable Devices for Healthcare: Ideas and Challenges," IEEE Communications Magazine, vol. 47, no. 7, pp. 74-80, July 2009. https://doi.org/10.1109/MCOM.2009.5183475
- Y. Wang, and Y. Zheng, "Fast and Secure Magnetic Worm Storage Systems," In Proc. of the 2ndIEEEInternationalSecurityinStorageWorkshop(SISW'03), pp. 11-25, Oct. 31, 2003.
- D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and Privacy for Implantable Medical Devices," IEEE Computer Society, Vol. 7, No. 1, January-March 2008.
- S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, K. fu, "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices," ACM SIGCOMM 2011, Toronto, Ontario, Canada, 2011.
- J. Kelsey and B. Schneier "Secure Audit Logs to Support Computer Forensics," ACM Transactions on Information and System Security, vol.2, no.2, pp. 159-176, 1999. https://doi.org/10.1145/317087.317089
- D. Ma and G. Tsudik, "A New Approach to Secure Logging," ACM Transactions on Storage, vol.5, Issue 1, pp. 2:1-2:21, Mar. 2009.
- R. Accorsi, "BBox : A Distributed Secure Log Architecture," Public Key Infrastructures, Services and Applications, LNCS, vol. 6711, pp 109-124, 2011.
- J. E. Holt, "Logcrypt: Forward Security and Public Verification for Secure Audit Logs," In Proc. of the Australasian Workshops on Grid Computing and E-research, vol.54, pp. 203-211, Tasmania, Jan. 2006.
- D. Ma and G. Tsudik, "Forward-Secure Sequential Aggregate Authentication," " In Proc. of the IEEE Symposium on Security and Privacy, pp. 86-91, Berkeley, May 2007
- D. Ma, "Practical Forward Secure Sequential Aggregate Signatures," In Proc. of the ACM Symposium on Information, Computer and Communications Security, pp.341-352, Tokyo, Mar. 2008
- A. A. Yavuz and P. Ning, "BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed System," In Proc. of the Annual Computer Security Applications Conference, pp. 219-218, Honolulu, Dec. 2009.
- A. A. Yavuz, P. Ning, and M. Reiter, "BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems," ACM Transactions on Information and System Security, vol. 15, Issue 2, pp. 9:1-9:28, July 2012.
- D. Boneh, "The Decision Diffie-Hellman Problem," In Proc. of the Third Algorithmic Number Theory Symposium, LNCS, vol. 1423, pp. 48-63, 1998.
- E. Mykletun, M. Narasimha, and G. Tsudik, "Signature Bouquets: Immutability for Aggregated/Condensed Signatures," In Proc. of the European Symposium on Research in Computer Security (ESORICS), pp. 160-176, France, Sep. 2004.