<div dir="ltr">Surety tried a hash tree approach whereby periodic results were published in the NYTimes.<div><br></div><div>Here is an analysis of that approach:</div><div><a href="http://teal.gmu.edu/courses/ECE543/project/reports_2005/TIMESTAMPING_report.pdf">http://teal.gmu.edu/courses/ECE543/project/reports_2005/TIMESTAMPING_report.pdf</a></div><div><br clear="all"><div><div dir="ltr">Prof. L. Jean Camp<br><a href="http://www.ljean.com" target="_blank">http://www.ljean.com</a><br>Human-Centered Security<div><a href="http://usablesecurity.net/" target="_blank">http://usablesecurity.net/</a><br>Economics of Security <br><a href="http://www.infosecon.net/" target="_blank">http://www.infosecon.net/</a><br>Congressional Fellow<br><a href="http://www.ieeeusa.org/policy/govfel/congfel.asp" target="_blank">http://www.ieeeusa.org/policy/govfel/congfel.asp</a></div></div></div>
</div></div>