• Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not...
    11 KB (1,287 words) - 10:03, 4 April 2025
  • Thumbnail for Timestamp
    Decentralized trusted timestamping on the blockchain Linked timestamping Timestamping (computing) Timestamp-based concurrency control Trusted timestamping Claudia...
    7 KB (919 words) - 18:47, 12 July 2025
  • Thumbnail for OpenTimestamps
    OpenTimestamps (OTS) is an open-source project that aims to provide a standard format for blockchain timestamping. With the advent of systems like Bitcoin...
    15 KB (1,328 words) - 08:53, 18 July 2025
  • example of trusted timestamping. It has been extended to create the ANSI ASC X9.95 Standard. In the protocol a Time Stamp Authority (TSA) is a trusted third...
    2 KB (288 words) - 01:13, 6 February 2025
  • Linked timestamping is a type of trusted timestamping where issued time-stamps are related to each other. Each time-stamp would contain data that authenticates...
    13 KB (1,715 words) - 19:00, 25 March 2025
  • network uses timestamping to monitor the nodes on a high availability computer cluster. Timestamping computer files (updating the timestamp in the per-file...
    1 KB (151 words) - 14:37, 9 July 2025
  • Thumbnail for Merkle tree
    received from any non-trusted source, like any peer in the P2P network. Then, the received hash tree is checked against the trusted top hash, and if the...
    15 KB (1,822 words) - 10:14, 15 July 2025
  • installations, the root account on each individual system may be treated as less trusted than the administrators of the centralized password system, so it remains...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • February 2020. Murray, John (2010). A Crail Scrapbook. Crail: Crail Museum Trust. Stewart, Ian (1986). "Obituary: Lieutenant-Colonel J.K.R. Murray" (PDF)...
    21 KB (1,968 words) - 00:17, 15 July 2025
  • Thumbnail for Caesar cipher
    security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network...
    19 KB (2,076 words) - 00:10, 17 July 2025
  • Thumbnail for VeraCrypt
    physical access to the computer. VeraCrypt does not take advantage of Trusted Platform Module (TPM). VeraCrypt FAQ repeats the negative opinion of the...
    38 KB (3,218 words) - 13:02, 5 July 2025
  • Hashcash HMAC International Association for Cryptologic Research (IACR) Trusted timestamping Dmitry Khovratovich, Christian Rechberger & Alexandra Savelieva (2011)...
    52 KB (4,982 words) - 22:11, 15 July 2025
  • Thumbnail for HMAC
    communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication. Any cryptographic hash...
    18 KB (2,320 words) - 16:34, 18 July 2025
  • making transient-key cryptography particularly useful for digital trusted timestamping. Transient-key cryptography was invented in 1997 by Michael Doyle...
    8 KB (1,193 words) - 05:28, 21 June 2025
  • Thumbnail for Cryptography
    undercover war on your internet secrets: How online surveillance cracked our trust in the web". TechRepublic. Archived from the original on 12 June 2016. Retrieved...
    100 KB (11,081 words) - 03:44, 17 July 2025
  • The ANSI X9.95 standard for trusted timestamps expands on the widely used RFC 3161 - Internet X.509 Public Key Infrastructure Time-Stamp Protocol by adding...
    7 KB (1,013 words) - 07:11, 21 June 2024
  • Thumbnail for Web of trust
    people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually...
    24 KB (3,527 words) - 01:54, 19 June 2025
  • cryptographic standards, such as S/MIME, PKCS #12 and the RFC 3161 digital timestamping protocol. OpenSSL is open source software that can encrypt, decrypt,...
    3 KB (322 words) - 07:10, 20 February 2025
  • Associated Signature Containers (ASiC) Trusted timestamping Turner, Dawn M. "INTRODUCTION INTO XADES FOR TRUST SERVICE PROVIDERS". Cryptomathic. Retrieved...
    7 KB (740 words) - 19:04, 9 August 2024
  • separation technique Time Stamping Authority, carrying out cryptographic trusted timestamping Trichostatin A, an inhibitor of histone deacetylases Trypticase soy...
    3 KB (332 words) - 06:29, 2 December 2024
  • security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network...
    7 KB (668 words) - 13:06, 10 July 2025
  • Thumbnail for Encryption
    has not been tampered with. If an endpoint device has been configured to trust a root certificate that an attacker controls, for example, then the attacker...
    34 KB (3,645 words) - 13:17, 2 July 2025
  • Electronic Signature Associated Signature Containers (ASiC) Trusted timestamping European Union Trusted Lists (EUTL) "ISO 32000-1:2008 Document management --...
    11 KB (1,270 words) - 21:32, 28 June 2025
  • forgery by trusted timestamping and dissemination of a distributed database. This approach eliminates the need to involve a mutually acceptable trusted third...
    26 KB (2,209 words) - 00:23, 13 July 2025
  • Thumbnail for Cipher
    security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network...
    18 KB (2,152 words) - 04:08, 13 July 2025
  • (0.001 bitcoin) to a trusted recipient where each recipient added 10,000 satoshis ($0.34 at the time) to send to the next trusted recipient. The "lightning...
    13 KB (1,180 words) - 10:27, 13 July 2025
  • Thumbnail for Cryptocurrency
    Cryptocurrencies use various timestamping schemes to "prove" the validity of transactions added to the blockchain ledger without the need for a trusted third party. The...
    222 KB (20,114 words) - 22:26, 18 July 2025
  • security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network...
    13 KB (1,337 words) - 12:18, 2 June 2025
  • Thumbnail for Pigpen cipher
    security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network...
    13 KB (1,675 words) - 00:31, 11 July 2025
  • the identities of parties that person transacted with. Secure digital timestamping can be used to prove that data (even if confidential) existed at a certain...
    9 KB (1,015 words) - 11:14, 14 July 2025