Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Trusted timestamping
Known as:
Trusted time stamp
, Digital timestamping
, DTSS
Expand
Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
ANSI ASC X9.95 Standard
Bitcoin
CAdES (computing)
Cryptocurrency
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
Deriving Dynamics of Web Pages: A Survey
Marilena Oita
,
P. Senellart
TWAW
2011
Corpus ID: 1044925
The World Wide Web is dynamic by nature: content is continuously added, deleted, or changed, which makes it challenging for Web…
Expand
2010
2010
On the Implementation and Performance Assessment of a WirelessHART Distributed Packet Analyzer
P. Ferrari
,
A. Flammini
,
D. Marioli
,
S. Rinaldi
,
E. Sisinni
IEEE Transactions on Instrumentation and…
2010
Corpus ID: 24134392
Wireless sensor networks are nowadays a reality. The wide consensus gained by the IEEE 802.15.4 standard has facilitated the…
Expand
2009
2009
Timestamping for IEEE 1588 based clock synchronization in wireless LAN
A. Mahmood
,
G. Gaderer
IEEE International Symposium on Precision Clock…
2009
Corpus ID: 8127365
Clock synchronization is one of the enabling technologies for real-time networking. This paper is motivated by the need for WLAN…
Expand
2008
2008
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005
Ayesha Altaf
,
M. Javed
,
Attiq Ahmed
Ninth ACIS International Conference on Software…
2008
Corpus ID: 15771239
Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard…
Expand
2008
2008
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
Bharath Krishnamachari
,
Gabriel Ghinita
,
Panos Kalnis
International Conference on Statistical and…
2008
Corpus ID: 6164713
Location-based services, such as on-line maps, obtain the exact location of numerous mobile users. This information can be…
Expand
Highly Cited
2004
Highly Cited
2004
Confounded Expectations: Informedia at TRECVID 2004
Alexander Hauptmann
,
Yan Chen
,
+9 authors
H. Wactlar
TREC Video Retrieval Evaluation
2004
Corpus ID: 8006586
For TRECVID 2004, CMU participated in the semantic feature extraction task, and the manual, interactive and automatic search…
Expand
2002
2002
On-Chip Monitoring of Single- and Multiprocessor Hardware Real-Time Operating Systems
Mohammed El Shobaki
2002
Corpus ID: 16396514
This paper presents a novel hardware monitoring system that gives non-intrusive observability into the execution of hardware…
Expand
1998
1998
INQIRE: a software approach to monitoring QoS in ATM networks
Thomas M. Chen
,
Steven S. Liu
,
M. J. Procanik
,
David C. Wang
,
D. Casey
IEEE Network
1998
Corpus ID: 16161787
Unlike traditional best-effort packet networks, ATM networks support a wide range of services by providing a specified QoS on…
Expand
1993
1993
Simulating synchronized clocks and common knowledge in distributed systems
G. Neiger
,
S. Toueg
JACM
1993
Corpus ID: 14966956
Time and knowledge are studied in synchronous and asynchronous distributed systems. A large class of problems that can be solved…
Expand
1993
1993
Algorithms and performance evaluation of the Xphone multimedia communication system
A. Eleftheriadis
,
S. Pejhan
,
D. Anastassiou
MULTIMEDIA '93
1993
Corpus ID: 16335368
| We describe and evaluate the performance of the algorithms used in Columbia University’s \Xphone" multimediacommunication…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE