Skip to search formSkip to main contentSkip to account menu

Trusted timestamping

Known as: Trusted time stamp, Digital timestamping, DTSS 
Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
The World Wide Web is dynamic by nature: content is continuously added, deleted, or changed, which makes it challenging for Web… 
2010
2010
Wireless sensor networks are nowadays a reality. The wide consensus gained by the IEEE 802.15.4 standard has facilitated the… 
2009
2009
Clock synchronization is one of the enabling technologies for real-time networking. This paper is motivated by the need for WLAN… 
2008
2008
Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard… 
2008
2008
Location-based services, such as on-line maps, obtain the exact location of numerous mobile users. This information can be… 
Highly Cited
2004
Highly Cited
2004
For TRECVID 2004, CMU participated in the semantic feature extraction task, and the manual, interactive and automatic search… 
2002
2002
This paper presents a novel hardware monitoring system that gives non-intrusive observability into the execution of hardware… 
1998
1998
Unlike traditional best-effort packet networks, ATM networks support a wide range of services by providing a specified QoS on… 
1993
1993
Time and knowledge are studied in synchronous and asynchronous distributed systems. A large class of problems that can be solved… 
1993
1993
| We describe and evaluate the performance of the algorithms used in Columbia University’s \Xphone" multimediacommunication…