-
1
-
-
0024861622
-
On the complexity of radio communication
-
[ABLP]
-
[ABLP] N. Alon, A. Bar-Noy, N. Linial, and D. Peleg, On the complexity of radio communication, ACM STOC, pp. 274-285 (1989).
-
(1989)
ACM STOC
, pp. 274-285
-
-
Alon, N.1
Bar-Noy, A.2
Linial, N.3
Peleg, D.4
-
2
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
[Bea]
-
[Bea] D. Beaver, Multiparty protocols tolerating half faulty processors, Proc. Crypto '89, pp. 560-572 (1989).
-
(1989)
Proc. Crypto '89
, pp. 560-572
-
-
Beaver, D.1
-
3
-
-
0346396336
-
Reliable communication over partially authenticated networks
-
[BF]
-
[BF] A. Beimel and M. Franklin, Reliable communication over partially authenticated networks, Theoret. Comput. Sci., 220(1):185-210 (1999).
-
(1999)
Theoret. Comput. Sci.
, vol.220
, Issue.1
, pp. 185-210
-
-
Beimel, A.1
Franklin, M.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computing
-
[BGW]
-
[BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computing, Proc. ACM STOC, pp. 1-10 (1988).
-
(1988)
Proc. ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0023985539
-
Privacy amplification by public discussion
-
[BBR]
-
[BBR] C. Bennett, G. Brassard, and M. Robert, Privacy amplification by public discussion, SIAM J. Cotnput., 17(2):210-229(1988).
-
(1988)
SIAM J. Cotnput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, M.3
-
7
-
-
0022144724
-
Asynchronous consensus and broadcast protocols
-
[BT]
-
[BT] G. Bracha and S. Toueg, Asynchronous consensus and broadcast protocols, J. Assoc. Comput. Mach., 32(4):824-840 (1985).
-
(1985)
J. Assoc. Comput. Mach.
, vol.32
, Issue.4
, pp. 824-840
-
-
Bracha, G.1
Toueg, S.2
-
8
-
-
0345872645
-
Trust and security: A new look at the Byzantine generals problem
-
[BDK] American Mathematical Society, Providence, RI
-
[BDK] M. Burmester, Y. Desmedt, and G. Kabatianski, Trust and security: a new look at the Byzantine generals problem, in Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 38, pp. 75-83, American Mathematical Society, Providence, RI (1997).
-
(1997)
Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.38
, pp. 75-83
-
-
Burmester, M.1
Desmedt, Y.2
Kabatianski, G.3
-
9
-
-
84898947315
-
Multiparty unconditional secure protocols
-
[CCD]
-
[CCD] D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditional secure protocols, Proc. ACM STOC, pp. 11-19(1988).
-
(1988)
Proc. ACM STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
11
-
-
0009768331
-
The Byzantine generals strike again
-
[Dol]
-
[Dol] D. Dolev, The Byzantine generals strike again, J. Algorithms, 3:14-30 (1982).
-
(1982)
J. Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
12
-
-
0027341860
-
Perfectly secure message transmission
-
[DDWY]
-
[DDWY] D. Dolev, C. Dwork, O. Waarts, and M. Yung, Perfectly secure message transmission, J. Assoc. Comput. Mach., 40(l):17-t7 (1993).
-
(1993)
J. Assoc. Comput. Mach.
, vol.40
, Issue.50
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
13
-
-
23844506174
-
Secure hypergraphs: Privacy from partial broadcast
-
[FY] to appear.
-
[FY] M. Franklin and M. Yung, Secure hypergraphs: privacy from partial broadcast, SIAM J. Discrete Math., to appear.
-
SIAM J. Discrete Math.
-
-
Franklin, M.1
Yung, M.2
-
14
-
-
0026367257
-
Fault-tolerant computation in the full information model
-
[GGL]
-
[GGL] O. Goldreich, S. Goldwasser, and N. Linial, Fault-tolerant computation in the full information model, Proc. lEEESymp. FOCS, pp. 447-157 (1991).
-
(1991)
Proc. LEEESymp. FOCS
, pp. 447-1157
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
15
-
-
84976810569
-
Reaching agreement in the presence of faults
-
[PSL]
-
[PSL] M. Pease, R. Shostak, and L. Lamport, Reaching agreement in the presence of faults, J. Assoc. Comput. Mach., 27(2):228-234 (1980).
-
(1980)
J. Assoc. Comput. Mach.
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
17
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
[Rab]
-
[Rab] T. Rabin, Robust sharing of secrets when the dealer is honest or faulty, J. Assoc. Comput. Mach., 41(6):1089-1109 (1994).
-
(1994)
J. Assoc. Comput. Mach.
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
18
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
[RB]
-
[RB] T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, Proc. ACM STOC, pp. 73-85 (1989).
-
(1989)
Proc. ACM STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
19
-
-
0012527611
-
Efficient perfectly secure message transmission in synchronous networks
-
[SA]
-
[SA] H. Sayeed and H. Abu-Amara, Efficient perfectly secure message transmission in synchronous networks, Inform, and Comput., 126(1):53-61 (1996).
-
(1996)
Inform, and Comput.
, vol.126
, Issue.1
, pp. 53-61
-
-
Sayeed, H.1
Abu-Amara, H.2
-
20
-
-
24944432519
-
Secure communication in broadcast channels: The answer to Franklin and Wright's question
-
WD
-
[WDJ Y. Wang and Y. Desmedt, Secure communication in broadcast channels: the answer to Franklin and Wright's question, Proc. Eurocrypt '99, pp. 446-458 (1999).
-
(1999)
Proc. Eurocrypt '99
, pp. 446-458
-
-
Wang, Y.1
Desmedt, Y.2
|