-
1
-
-
84976814834
-
Lightweight causal and atomic group multicast
-
(Aug.)
-
BIRMAN, K. P., SCHIPER, A., AND STEPHENSON, P. 1991. Lightweight causal and atomic group multicast. ACM Trans. Comput. Syst. 9, 3 (Aug.), 272-314.
-
(1991)
ACM Trans. Comput. Syst.
, vol.9
, Issue.3
, pp. 272-314
-
-
BIRMAN, K.P.1
SCHIPER, A.2
STEPHENSON, P.3
-
2
-
-
0038462781
-
A survey of hardware implementations of RSA
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
BRICKELL, E. 1990. A survey of hardware implementations of RSA. In Advances in Cryptology-CRYPTO '89 Proceedings. Lecture Notes in Computer Science, vol. 435. Springer-Verlag, New York, 368-370.
-
(1990)
Advances in Cryptology-CRYPTO '89 Proceedings
, vol.435
, pp. 368-370
-
-
BRICKELL, E.1
-
3
-
-
0012242251
-
Randomization in Byzantine agreement
-
CHOR, B., AND DWORK, C 1989. Randomization in Byzantine agreement. Adv. Comput Res. 5, 443-497.
-
(1989)
Adv. Comput Res.
, vol.5
, pp. 443-497
-
-
CHOR, B.1
DWORK, C.2
-
4
-
-
0022246697
-
Atomic broadcast: From simple message diffusion to Byzantine agreement
-
200-206. A revised version appears as IBM Res. Lab. Tech. Rep. RJ5244 (April 1989), IBM, Armonk, N.Y
-
CRISTIAN, F., AGHILI, H., STRONG, R., AND DOLEV, D. 1985. Atomic broadcast: From simple message diffusion to Byzantine agreement. In Proceedings of the 15th International Symposium on Fault-Tolerant Computing. 200-206. A revised version appears as IBM Res. Lab. Tech. Rep. RJ5244 (April 1989), IBM, Armonk, N.Y.
-
(1985)
Proceedings of the 15th International Symposium on Fault-Tolerant Computing
-
-
CRISTIAN, F.1
AGHILI, H.2
STRONG, R.3
DOLEV, D.4
-
5
-
-
84976740532
-
Digital signatures with RSA and other public-key cryptosystems
-
(Apr.)
-
DENNING, D. E. 1984. Digital signatures with RSA and other public-key cryptosystems. Commun. ACM 27, 4 (Apr.), 388-392.
-
(1984)
Commun. ACM
, vol.27
, Issue.4
, pp. 388-392
-
-
DENNING, D.E.1
-
6
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
DESMEDT Y., AND FRANKEL, Y. 1992 Shared generation of authenticators and signatures. In Advances in Cryptology-CRYPTO '91 Proceedings. Lecture Notes in Computer Science, vol. 576 Springer-Verlag, New York, 457-469.
-
(1992)
Advances in Cryptology-CRYPTO '91 Proceedings
, vol.576
, pp. 457-469
-
-
DESMEDT, Y.1
FRANKEL, Y.2
-
7
-
-
85023809951
-
Threshold cryptosystems
-
Lecture Notes in Computer Science, Springer-Verlag. New York
-
DESMEDT, Y., AND FRANKEL, Y. 1990. Threshold cryptosystems. In Advances in Cryptology-CRYPTO '89 Proceedings. Lecture Notes in Computer Science, vol. 435. Springer-Verlag. New York, 307-315.
-
(1990)
Advances in Cryptology-CRYPTO '89 Proceedings
, vol.435
, pp. 307-315
-
-
DESMEDT, Y.1
FRANKEL, Y.2
-
8
-
-
85028450627
-
Non-malleable cryptography
-
ACM, New York
-
DOLEV, D., DWORK, C., AND NAOR, M. 1991. Non-malleable cryptography. In Proceedings of the 23rd Annual ACM Symposium on Theory of Computing. ACM, New York, 542-552.
-
(1991)
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
DOLEV, D.1
DWORK, C.2
NAOR, M.3
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
(July)
-
ELGAMAL, T. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. IT-31, 4 (July), 469-472.
-
(1985)
IEEE Trans. Inf. Theory. IT-31
, vol.4
, pp. 469-472
-
-
ELGAMAL, T.1
-
11
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
(Apr.)
-
FISCHER, M. J., LYNCH, N. A., AND PATERSON, M. S. 1985. Impossibility of distributed consensus with one faulty process. J. ACM 32, 2 (Apr.), 374-382.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
FISCHER, M.J.1
LYNCH, N.A.2
PATERSON, M.S.3
-
14
-
-
0025550464
-
Early-delivery atomic broadcast
-
ACM, New York
-
GOPAL, A., STRONG, R., TOUEG, S., AND CRISTIAN, F. 1990. Early-delivery atomic broadcast. In Proceedings of the 9th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York, 297-309.
-
(1990)
Proceedings of the 9th Annual ACM Symposium on Principles of Distributed Computing
, pp. 297-309
-
-
GOPAL, A.1
STRONG, R.2
TOUEG, S.3
CRISTIAN, F.4
-
15
-
-
84977284109
-
How to make replicated data secure
-
Lecture Notes in Computer Science, vol 293. Springer-Verlag, New York
-
HERLIHY, M. P., AND TYGAR, J. D. 1988. How to make replicated data secure. In Advances in Cryptology-CRYPTO '87 Proceedings. Lecture Notes in Computer Science, vol 293. Springer-Verlag, New York, 379-391.
-
(1988)
Advances in Cryptology-CRYPTO '87 Proceedings
, pp. 379-391
-
-
HERLIHY, M.P.1
TYGAR, J.D.2
-
16
-
-
2342660026
-
Towards the elimination of the effects of malicious logic: Fault tolerance approaches
-
NBS/NCSC, Washington, D.C.
-
JOSEPH, M. K. 1987. Towards the elimination of the effects of malicious logic: Fault tolerance approaches. In Proceedings of the 10th NBS/NCSC National Computer Security Conference. NBS/NCSC, Washington, D.C., 238-244.
-
(1987)
Proceedings of the 10th NBS/NCSC National Computer Security Conference
, pp. 238-244
-
-
JOSEPH, M.K.1
-
19
-
-
0017972109
-
The implementation of reliable distributed multiprocess systems
-
a
-
LAMPORT, L. 1978a. The implementation of reliable distributed multiprocess systems. Comput. Netw. 2, 95-114.
-
(1978)
Comput. Netw.
, vol.2
, pp. 95-114
-
-
LAMPORT, L.1
-
20
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
b, (July)
-
LAMPORT, L. 1978b. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (July), 558-565.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
LAMPORT, L.1
-
21
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
(Nov.)
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
LAMPSON, B.1
ABADI, M.2
BURROWS, M.3
WOBBER, E.4
-
22
-
-
84937578837
-
Another method for attaining security against adaptively chosen ciphertext attacks
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
LIM, C. H., AND LEE, P. J. 1994. Another method for attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology-CRYPTO '93 Proceedings. Lecture Notes in Computer Science, vol. 773. Springer-Verlag, New York, 420-434.
-
(1994)
Advances in Cryptology-CRYPTO '93 Proceedings
, vol.773
, pp. 420-434
-
-
LIM, C.H.1
LEE, P.J.2
-
23
-
-
84951741545
-
VICTOR: An efficient RSA hardware implementation
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
ORUP, B., SVENDSEN, E., AND ANDREASEN, E. 1991. VICTOR: An efficient RSA hardware implementation. In Advances in Cryptology-EUROCRYPT '90 Proceedings. Lecture Notes in Computer Science, vol. 473. Springer-Verlag, New York, 245-252.
-
(1991)
Advances in Cryptology-EUROCRYPT '90 Proceedings
, vol.473
, pp. 245-252
-
-
ORUP, B.1
SVENDSEN, E.2
ANDREASEN, E.3
-
24
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
(Apr.)
-
RABIN, M. O. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36, 2 (Apr.), 335-348.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
RABIN, M.O.1
-
28
-
-
0026851635
-
Integrating security in a group oriented distributed system
-
IEEE, New York
-
REITER, M. K., BIRMAN, K. P., AND GONG, L. 1992. Integrating security in a group oriented distributed system. In Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy. IEEE, New York, 18-32.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy
, pp. 18-32
-
-
REITER, M.K.1
BIRMAN, K.P.2
GONG, L.3
-
30
-
-
78650922644
-
The MD4 message digest algorithm
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
RIVEST, R. L. 1991. The MD4 message digest algorithm. In Advances in Cryptology-CRYPTO '90 Proceedings. Lecture Notes in Computer Science, vol. 537. Springer-Verlag, New York, 303-311.
-
(1991)
Advances in Cryptology-CRYPTO '90 Proceedings
, vol.537
, pp. 303-311
-
-
RIVEST, R.L.1
-
31
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
(Feb.)
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
RIVEST, R.L.1
SHAMIR, A.2
ADLEMAN, L.3
-
32
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
(Dec.)
-
SCHNEIDER, F. B. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv. 22, 4 (Dec.), 299-319.
-
(1990)
ACM Comput. Surv.
, vol.22
, Issue.4
, pp. 299-319
-
-
SCHNEIDER, F.B.1
-
33
-
-
85034812994
-
The RSA cryptography processor
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
SEDLAK, H. 1988. The RSA cryptography processor. In Advances in Cryptology: Proceedings of EUROCRYPT '87. Lecture Notes in Computer Science, vol. 304. Springer-Verlag, New York, 95-105.
-
(1988)
Advances in Cryptology: Proceedings of EUROCRYPT '87
, vol.304
, pp. 95-105
-
-
SEDLAK, H.1
-
35
-
-
0026868479
-
Principal features of the VOLTAN family of reliable node architectures for distributed systems
-
(May)
-
SHRIVASTAVA, S. K., EZHILCHELVAN, P. D., SPEIRS, N. A., TAO, S., AND TULLY, A. 1992. Principal features of the VOLTAN family of reliable node architectures for distributed systems. IEEE Trans. Comput. 41, 5 (May), 542-549.
-
(1992)
IEEE Trans. Comput.
, vol.41
, Issue.5
, pp. 542-549
-
-
SHRIVASTAVA, S.K.1
EZHILCHELVAN, P.D.2
SPEIRS, N.A.3
TAO, S.4
TULLY, A.5
-
36
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
USENIX Association
-
STEINER, J. G., NEUMAN, C., AND SCHILLER, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter Conference. USENIX Association, 191-202.
-
(1988)
Proceedings of the USENIX Winter Conference
, pp. 191-202
-
-
STEINER, J.G.1
NEUMAN, C.2
SCHILLER, J.I.3
-
38
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
(June)
-
VOYDOCK, V. L., AND KENT, S. T. 1983. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June), 135-171.
-
(1983)
ACM Comput. Surv.
, vol.15
, Issue.2
, pp. 135-171
-
-
VOYDOCK, V.L.1
KENT, S.T.2
|