1 S Haber, W Stornetta.How to Time-stamp a Digital Document.Journal of Crypto logy, 1991, 3(2):99~ 1112 D Bayer, S Haber, W Stornetta.I mproving the Effiency and Reliability of Digital T ime-stamping.M ethods in Communica-tion, Security, and Computer Science-Sequences′91, 1992, 329 ~ 3343 A Buldas, P L aud, H Lipmaa, J Villemson.T ime-stamping with Binary Linking Schemes.Advances in Cryptolog y-CRYP TO′98(LNCS 1462), 1998, 486~ 5014 Digital No tary Service.http:// ww w.surety.com5 冯登国, 裴定一.密码学导引.北京 :科学出版社, 19996 M ike Just.Some Time-stamping P rotocol Failuves.In Internet Society Symposium on Ne tw ork and Distributed System Secu-rity.1998.Available at http :// ww w.scs.carleton.ca/ ~ just/.7 Jo sh Benaloh, M ichael de M are.Efficient Broadcast T ime-stamping.In:T echnical Repor t 1, Clarkson University Depar tment of M athematics and Computer Science.19918 J-J Quisquater, H M assias, J Ser re t A vila, B Preneel, B V an Ro mpay.Specification and Implementation of a Time-stamping System.I n:T imesec T echnical Report, 1999.A vailable at http:// w ww.dice.ucl.ac.be/ cry pto/ Timesec/ Timesec.html |