J Cucurull, J Puiggali - Security and Trust Management: 12th International …, 2016 - Springer
Several applications require robust and tamper-proof logging systems, eg electronic voting
or bank information systems. At Scytl we use a technology, called immutable logs, that we …