Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

concurrent authenticated tree

biblio

Visible to the public Efficient tamper-evident logging of distributed systems via concurrent authenticated tree

Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
  • Merkle history tree
  • Chameleon hash
  • chameleon hashing
  • concurrent authenticated tree
  • Concurrent Authentication
  • concurrent large-scale log streams
  • cryptographic hashing
  • discrete log
  • highly concurrent scale log streams
  • large-scale distributed applications
  • large-scale distributed systems
  • log data
  • log management tools
  • logarithmic number
  • Cats
  • Merkle-tree approach
  • providing security
  • public verifiability
  • resource-constrained systems
  • secure audit logging schemes
  • Secure logging
  • secure logging system
  • security community
  • space-efficiency
  • tamper-evident logging
  • tree data structures
  • untrusted machine
  • History
  • Concurrency
  • cyber-physical systems
  • pubcrawl
  • composability
  • Cryptography
  • system monitoring
  • distributed processing
  • Servers
  • authentication
  • Analytical models
  • tools
  • data structure
  • data structures
  • security
  • resilience
  • data integrity
  • Metrics
  • program verification
  • Resiliency
  • forward security
  • integrity verification
  • digital signatures
  • distributed system
  • integrity
  • concurrency control
  • audit logs

Terms of Use  |  ©2023. CPS-VO