Finding the Evidence in Tamper-Evident Logs | IEEE Conference Publication | IEEE Xplore