搜索结果: 1-2 共查到“军事学 logging schemes”相关记录2条 . 查询时间(0.25 秒)
We present four attacks on three cryptographic schemes intended for securing log files against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by Yavuz et al. (Financi...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...