Synchronizing Time Distribution

Authors

  • Sahar Adill Kaduma Babylon University- Collage of Science for women, Babil, Iraq

DOI:

https://doi.org/10.29304/jqcm.2022.14.4.1128

Keywords:

Time stamp, Distributed time stamp, Digital documents, Security, transaction

Abstract

With the wide span of internet brought great progress in different parts of human life, a digital documents have been employed as a media in exchange information between internet parties like text, audio, pictures and videos that leads to the issue of how to certify the document when created or modified in order to use it as secure digital media for storing information and transactions. This tend to employ  security technique for ensuring the documents integrity for a long period. One of these techniques is the time stamp that has many schemes. This research concentrate on distributed time-stamp scheme as a one of time stamp schemes, that suffers from drawback in achieving trusted security to overcome this draws a new technique issued to this scheme called "Synchronizing Process".

Downloads

Download data is not yet available.

References

[1] Ansper, Arne, AhtoBuldas, MärtSaarepera and Jan Willemson, “Improving the availability of timestampingservices,” Proceedings of ACISP2001, LNCS 2119, Springer-Verlag, (2001), pp:360-375.

[2] Stuart. Haber, Kaliski. Burt and Stornetta.Wakefield Scott ,“How Do Digital Time-Stamps SupportDigital Signatures?”,CryptoByte, 1 (3), (1995), pp.14-15, (http://www.rsa.com/rsalabs/.

[3] Stuart. Haber, W. Scott, "How to Time Stamp Digital Document", journal of cryptology, vol:3, no:2, (1991), pp: 99-11.
[4] International Organization for Standardization and International ElectrotechnicalCommission,ISO/IEC JTC 1/SC 27,"Information technology-Security techniques", Germany Din, (2000).
[5] International Organization for Standardization and International ElectrotechnicalCommission,ISO/IEC Working Draft 18014-1: Information technology - Security techniques -Time stampingservices -Part 1: Framework, http://csrc.nist.gov/cc/t4/sc27/post-londonfiles/27n2595.pdf, (2000).

[6] Surety.com; "Secure Time/Data Stamping in a Public Key Infrastructure", http://www.surety.com/home/pki.pdf, 2001.

[7] Une, Masashi, and Matsumoto. Tsutomu, “Relations between Security and Verification Procedures ofTime Stamps",Proceedings of the 2001 Symposium on Cryptography and Information Security,The Institute of Electronics, Information and Communication Engineers, (2001) pp.629-634.
[8] Karel. Wouters, " Time-Stamping: a survey", (1995), Available at: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=07147a4bfe6f61901a953c52ab29fcf2cfde2cf3

Downloads

Published

2023-01-07

How to Cite

Kaduma, S. A. (2023). Synchronizing Time Distribution. Journal of Al-Qadisiyah for Computer Science and Mathematics, 14(4), Comp Page 99–103. https://doi.org/10.29304/jqcm.2022.14.4.1128

Issue

Section

Computer Articles