Entry Yavuz:2012:BFB from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Yavuz:2012:BFB,
author = "Attila A. Yavuz and Peng Ning and Michael K. Reiter",
title = "{BAF} and {FI-BAF}: Efficient and Publicly Verifiable
Cryptographic Schemes for Secure Logging in
Resource-Constrained Systems",
journal = j-TISSEC,
volume = "15",
number = "2",
pages = "9:1--9:??",
month = jul,
year = "2012",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2240276.2240280",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Tue Jul 31 17:02:31 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Audit logs are an integral part of modern computer
systems due to their forensic value. Protecting audit
logs on a physically unprotected machine in hostile
environments is a challenging task, especially in the
presence of active adversaries. It is critical for such
a system to have forward security and append-only
properties such that when an adversary compromises a
logging machine, she cannot forge or selectively delete
the log entries accumulated before the compromise.
Existing public-key-based secure logging schemes are
computationally costly. Existing symmetric secure
logging schemes are not publicly verifiable and open to
certain attacks. In this article, we develop a new
forward-secure and aggregate signature scheme called
Blind-Aggregate-Forward (BAF), which is suitable for
secure logging in resource-constrained systems. BAF is
the only cryptographic secure logging scheme that can
produce publicly verifiable, forward-secure and
aggregate signatures with low computation,
key/signature storage, and signature communication
overheads for the loggers, without requiring any online
trusted third party support. A simple variant of BAF
also allows a fine-grained verification of log entries
without compromising the security or computational
efficiency of BAF. We prove that our schemes are secure
in Random Oracle Model (ROM). We also show that they
are significantly more efficient than all the previous
publicly verifiable cryptographic secure logging
schemes.",
acknowledgement = ack-nhfb,
articleno = "9",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- active,
5(4)492,
15(1)5,
15(3)14,
17(2)6,
18(3)9
- adversary,
10(4)6,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
17(3)11,
18(1)4,
18(2)5,
18(4)14
- aggregate,
11(2)5,
11(4)18,
12(1)3,
12(3)15,
13(4)32,
18(3)10
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- append-only,
17(4)15
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- audit,
2(2)159,
13(4)30
- called,
1(1)3,
1(1)66,
2(1)105,
2(2)177,
2(3)269,
10(1)4,
11(1)3,
11(3)14,
12(3)15,
13(1)10,
13(3)26,
13(3)27,
14(1)13,
14(4)28,
15(1)2,
15(4)18,
16(2)6,
17(1)2,
17(3)10,
17(4)16,
18(1)3
- cannot,
1(1)66,
2(2)177,
10(2)7,
11(3)12,
11(3)13,
12(1)5,
12(2)9,
12(3)14,
13(3)20,
13(4)39,
14(3)27,
15(2)6,
15(4)17,
16(1)3,
16(4)16
- certain,
10(2)5,
11(2)1,
11(4)22,
12(1)1,
12(1)6,
12(2)8,
12(4)20,
13(3)26,
13(4)40,
17(1)2,
17(3)10,
18(2)7
- challenging,
9(4)391,
10(4)3,
11(3)14,
12(1)2,
13(3)20,
13(3)27,
17(1)4
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(1)5,
17(2)7,
17(3)11,
18(2)5
- compromising,
2(3)269,
10(2)6,
11(3)13,
13(1)8,
15(3)11,
16(4)17,
17(2)7
- computation,
1(1)26,
2(3)332,
9(4)461,
11(2)6,
12(1)6,
13(3)22,
13(4)29,
14(1)5,
14(4)29,
14(4)31,
15(1)2,
16(3)11,
17(3)11
- computational,
10(2)5,
11(2)6,
12(1)3,
12(4)21,
13(3)28,
13(4)40,
15(1)3,
16(3)12,
16(4)17,
17(3)10,
17(3)12,
17(4)15,
18(2)7,
18(4)12
- computationally,
2(2)159,
2(4)416,
11(2)5
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
16(2)5,
17(2)6
- costly,
13(4)36
- critical,
11(4)23,
12(4)20,
13(4)38,
16(2)5,
17(3)12
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- develop,
2(2)138,
10(2)8,
10(3)9,
11(3)12,
12(1)4,
12(1)6,
12(3)14,
13(3)22,
13(3)27,
14(1)9,
14(4)32,
15(1)3,
15(2)10,
16(2)7,
16(3)10,
17(1)2
- due,
2(4)354,
11(4)19,
13(3)25,
14(1)7,
14(4)31,
18(1)1
- efficiency,
9(4)461,
10(2)6,
10(3)12,
11(2)1,
11(4)17,
11(4)18,
11(4)23,
12(1)3,
13(4)30,
13(4)31,
13(4)33,
15(1)4,
16(4)17,
18(2)5
- efficient,
1(1)26,
3(2)63,
6(2)258,
6(3)365,
7(1)21,
9(4)391,
9(4)461,
10(1)3,
10(2)5,
10(2)6,
10(4)2,
11(1)3,
11(2)4,
11(2)6,
11(3)15,
11(4)19,
12(1)1,
12(3)15,
12(3)18,
12(4)21,
13(1)9,
13(1)10,
13(3)24,
13(3)27,
13(4)31,
13(4)32,
13(4)34,
13(4)38,
14(1)5,
14(1)14,
15(1)4,
15(2)6,
15(4)16,
16(1)2,
16(1)4,
17(3)10,
17(4)15,
18(3)11
- entry,
2(2)159,
14(4)29
- environments,
4(4)407,
7(3)392,
11(1)2,
11(3)14,
11(4)22,
12(3)15,
13(3)20,
13(3)25,
13(4)32,
13(4)37,
13(4)38,
18(3)11
- especially,
2(1)105,
11(2)1,
11(3)15,
11(4)17,
12(3)15,
12(4)21,
13(3)20,
16(2)5,
17(4)16
- existing,
1(1)93,
11(1)2,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- fine-grained,
11(1)3,
12(2)12,
16(2)6,
16(4)17,
18(3)11
- forensic,
2(2)159,
7(3)333,
12(1)4,
13(2)15
- forge,
11(4)18
- forward,
11(3)15,
13(1)10,
13(4)29,
14(1)11,
17(2)7,
18(3)10
- forward-secure,
13(4)37
- grained, fine-,
11(1)3,
12(2)12,
16(2)6,
18(3)11
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- hostile,
7(2)242,
11(3)14,
11(4)20,
11(4)22
- integral,
11(2)2
- log,
2(2)159,
10(4)6,
13(4)30,
17(3)12,
18(2)7
- logging,
2(2)159,
17(2)6
- low,
1(1)3,
11(2)5,
11(3)15,
12(3)14,
13(4)36,
14(1)5,
15(2)7,
17(4)15,
17(4)16,
18(1)2
- machine,
2(2)159,
2(2)177,
2(3)230,
2(3)295,
12(2)12,
14(1)6,
14(1)10,
14(2)18,
14(2)21,
15(3)12,
16(2)7,
16(3)9,
16(4)13,
16(4)14,
17(2)8,
18(2)6,
18(3)11
- modern,
10(3)10,
13(3)22,
17(4)16,
18(2)5
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
10(4)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
16(2)5,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(1)4,
17(2)7,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- Ning, Peng,
4(4)407,
7(2)274,
7(4)591,
8(1)41,
11(3)12,
11(4)22,
14(1)13
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- online,
1(1)3,
9(3)235,
11(2)5,
11(4)19,
12(2)13,
12(4)22,
13(4)41,
14(1)11,
14(4)32,
16(2)7,
16(4)14,
17(4)14,
18(1)1,
18(4)13
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- only, append-,
17(4)15
- open,
10(3)12,
10(4)3,
11(1)2,
16(4)15
- oracle,
11(2)4,
12(3)18
- overhead,
2(3)269,
11(2)5,
11(4)18,
11(4)23,
12(2)8,
12(3)14,
13(3)25,
14(1)5,
15(2)6,
16(1)1,
16(2)6,
16(2)7,
16(3)9,
16(3)11,
17(3)10,
17(4)15,
18(3)11,
18(4)12
- part,
2(3)332,
10(3)9,
10(4)4,
11(2)2,
11(4)20,
12(1)1,
13(1)10,
15(2)8,
16(4)15,
17(2)6,
17(4)16
- party,
9(4)421,
10(2)8,
10(4)3,
11(2)4,
11(2)6,
12(1)6,
12(2)12,
13(3)22,
13(4)39,
14(4)29,
17(3)9
- physically,
16(2)8
- presence,
11(3)16,
15(1)4,
15(3)14,
17(1)1,
17(3)9
- previous,
1(1)3,
1(1)93,
2(2)138,
11(2)3,
11(4)20,
12(3)16,
12(3)18,
13(1)10,
13(3)25,
14(1)3,
14(1)4,
15(2)10,
16(2)5,
16(4)13,
16(4)15,
16(4)17,
17(3)12
- produce,
12(1)3,
14(1)7
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- protecting,
1(1)66,
2(3)269,
2(4)354,
10(4)3,
13(3)22
- prove,
10(2)8,
10(4)1,
11(2)6,
11(3)16,
11(4)18,
12(2)8,
12(3)16,
12(3)19,
13(3)28,
16(1)4,
16(2)5,
16(4)17,
17(2)5,
17(4)15,
18(2)8
- publicly,
12(2)9,
17(1)1,
18(4)12
- random,
10(4)3,
11(2)3,
11(2)4,
11(3)13,
11(3)15,
12(1)2,
12(3)18,
13(1)10,
14(1)12,
15(3)12
- Reiter, Michael K.,
1(1)66,
2(2)138,
4(4)453,
12(2)11,
14(1)2,
14(1)13,
14(4)32,
17(2)8
- requiring,
11(1)2,
11(3)14,
11(3)16,
17(4)13,
18(4)13
- scheme,
7(2)206,
7(4)523,
8(2)228,
9(3)325,
9(4)461,
10(4)5,
11(2)4,
11(2)5,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
12(1)2,
12(1)3,
12(2)9,
12(3)15,
12(3)16,
12(3)18,
13(4)29,
13(4)31,
13(4)37,
13(4)41,
14(1)5,
15(4)18,
17(2)6,
17(3)10,
17(4)14,
17(4)15
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)4,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(3)15,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
14(4)29,
17(1)4,
17(2)6,
17(4)15,
18(3)10
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
10(4)6,
11(2)4,
11(2)5,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(2)5,
18(4)13
- secure, forward-,
13(4)37
- signature,
3(3)161,
7(1)1,
12(1)3,
12(2)11,
12(3)15,
13(4)37,
14(1)4,
14(1)5,
17(3)10
- significantly,
1(1)93,
9(2)181,
9(4)461,
11(2)3,
12(3)17,
13(4)29,
14(1)7,
15(1)4,
15(2)10,
15(3)11,
16(3)9,
17(1)1,
18(1)1
- simple,
2(3)230,
5(3)203,
9(2)181,
10(1)4,
10(3)11,
12(2)9,
12(2)13,
12(3)18,
12(4)21,
12(4)22,
13(3)26,
13(4)33,
14(3)27,
15(4)17,
17(1)2,
18(1)1
- storage,
2(3)295,
2(4)354,
9(1)1,
10(4)3,
11(1)4,
12(1)3,
12(3)15,
12(3)16,
12(3)18,
13(3)22,
13(4)30,
13(4)37,
14(1)12,
14(2)20,
15(2)6,
16(3)12,
17(3)10,
17(4)15
- suitable,
2(3)230,
2(4)354,
10(4)5,
11(4)22,
12(1)3,
12(3)15,
17(3)10
- support,
2(2)159,
5(4)492,
6(4)443,
6(4)547,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)12,
10(4)5,
11(1)3,
11(2)5,
12(1)3,
12(3)14,
12(3)15,
12(4)21,
13(3)24,
13(4)31,
14(1)3,
14(1)11,
14(1)12,
14(4)29,
15(3)13,
17(2)5,
17(2)7,
17(4)15,
18(2)8,
18(3)11
- symmetric,
16(1)2,
17(2)5
- task,
2(1)65,
2(3)295,
9(4)391,
10(2)5,
11(4)23,
12(3)14,
12(4)20,
13(3)20,
13(3)27,
15(3)13,
16(3)11,
17(1)4
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
11(3)14,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
13(4)35,
14(3)27,
14(4)31,
15(1)5,
15(2)10,
15(4)15,
15(4)16,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- third,
9(2)181,
11(2)3,
11(2)4,
11(2)6,
12(2)12,
13(4)31,
13(4)39,
14(4)29
- trusted,
2(2)138,
2(3)269,
8(2)153,
10(4)3,
11(2)6,
11(3)14,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
14(4)29,
16(2)5,
16(2)7,
16(4)15,
17(2)6,
18(2)8
- unprotected,
16(1)2
- value,
10(3)10,
10(4)1,
10(4)4,
11(2)5,
11(4)18,
12(1)6,
12(2)10,
13(1)10,
14(1)9,
14(1)14,
15(1)4,
15(4)17,
16(1)1,
17(3)10,
18(1)1,
18(2)5,
18(3)10
- variant,
9(4)461,
10(3)10,
11(4)17,
13(4)39,
14(1)4,
16(4)16,
18(3)10
- verifiable,
7(1)1,
16(3)11,
18(1)3
- verification,
2(3)332,
3(1)51,
8(3)287,
10(2)5,
10(2)6,
10(2)7,
10(3)9,
10(3)11,
11(2)5,
11(3)14,
12(1)3,
12(1)6,
14(1)5,
14(3)25,
14(4)32,
15(1)3,
15(4)18,
16(2)8,
17(2)6,
18(2)6,
18(2)8,
18(3)11,
18(4)14
- when,
2(3)295,
10(2)7,
10(3)12,
10(4)4,
10(4)6,
11(2)3,
11(2)6,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
12(2)10,
12(2)11,
12(4)20,
12(4)22,
13(1)10,
13(3)27,
13(4)32,
13(4)34,
13(4)35,
13(4)37,
15(2)6,
15(2)10,
15(3)14,
16(1)3,
16(2)8,
17(3)9,
17(4)13,
18(3)9,
18(4)12