Number | Date | Country | Kind |
---|---|---|---|
9-193535 | Jul 1997 | JP |
Number | Name | Date | Kind |
---|---|---|---|
4309569 | Merkle | Jan 1982 | A |
5311591 | Fischer | May 1994 | A |
5373561 | Haber et al. | Dec 1994 | A |
5432852 | Leighton et al. | Jul 1995 | A |
5465299 | Matsumoto et al. | Nov 1995 | A |
5712914 | Aucsmith et al. | Jan 1998 | A |
5903651 | Kocher | May 1999 | A |
5995623 | Kawano et al. | Nov 1999 | A |
6161183 | Saito et al. | Dec 2000 | A |
Number | Date | Country |
---|---|---|
A-3-25605 | Feb 1991 | JP |
A-6-180762 | Jun 1994 | JP |
B2-6-95302 | Nov 1994 | JP |
Entry |
---|
E. Okamoto, “Encryption Theory Introduction”, Kyoritsu Publishing company, 1193, pp. 134-138. |
Haber et al, “How to Time-Stamp a Digital Document,” Journal of Cryptology, vol. 3, No. 2, p. 99-111, Aug. 1991.* |
Devanbu et al, “Stack and Queue INtegrity on Hostile Platforms,” IEEE Proc. on Secrecy and Privacy, p. 198-206, 1998. |