-
1
-
-
84976715309
-
An Efficient and Fault-Tolerant Solution for Distributed Mutual Exclusion
-
D. Agrawal and A. El-Abbadi, "An Efficient and Fault-Tolerant Solution for Distributed Mutual Exclusion," ACM Trans. Computer Systems, vol. 9, no. 1, pp. 1-20, 1991.
-
(1991)
ACM Trans. Computer Systems
, vol.9
, Issue.1
, pp. 1-20
-
-
Agrawal, D.1
El-Abbadi, A.2
-
2
-
-
84957718798
-
Quorum-Based Secure Multi-Party Computation
-
K. Nyberg, ed., Espoo, Finland, May
-
D. Beaver and A. Wool, "Quorum-Based Secure Multi-Party Computation," Proc. Advances in Cryptology - EUROCRYPT '98, K. Nyberg, ed., pp. 375-390, Espoo, Finland, May 1998.
-
(1998)
Proc. Advances in Cryptology - EUROCRYPT '98
, pp. 375-390
-
-
Beaver, D.1
Wool, A.2
-
5
-
-
85062838317
-
Safeguarding Cryptographic Keys
-
G.R. Blakley, "Safeguarding Cryptographic Keys," Proc. AFIPS, Nat'l Computer Conf., vol. 48, pp. 313-317, 1979.
-
(1979)
Proc. AFIPS, Nat'l Computer Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
6
-
-
85028751599
-
On the Information Rate of Secret Sharing Schemes
-
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, "On the Information Rate of Secret Sharing Schemes," Proc. Advances in Cryptology - CRYPTO '92, pp. 148-167, 1992.
-
(1992)
Proc. Advances in Cryptology - CRYPTO '92
, pp. 148-167
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
8
-
-
84930838320
-
The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data
-
S.Y. Cheung, M.H. Ammar, and M. Ahamad, "The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data," IEEE Trans. Knowledge and Data Eng., vol. 4, no. 6, pp. 582-592, 1992.
-
(1992)
IEEE Trans. Knowledge and Data Eng.
, vol.4
, Issue.6
, pp. 582-592
-
-
Cheung, S.Y.1
Ammar, M.H.2
Ahamad, M.3
-
9
-
-
0022114934
-
Consistency in Partitioned Networks
-
S.B. Davidson, H. Garcia-Molina, and D. Skeen, "Consistency in Partitioned Networks," ACM Computing Surveys, vol. 17, no. 3, pp. 341-370, 1985.
-
(1985)
ACM Computing Surveys
, vol.17
, Issue.3
, pp. 341-370
-
-
Davidson, S.B.1
Garcia-Molina, H.2
Skeen, D.3
-
10
-
-
0027961556
-
How to Share a Function Securely
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, "How to Share a Function Securely," Proc. 26th ACM Symp. Theory of Computing (STOC), pp. 522-533, 1994.
-
(1994)
Proc. 26th ACM Symp. Theory of Computing (STOC)
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
12
-
-
84978970262
-
An Efficient Existentially Unforgeable Signature Scheme and Its Applications
-
Y.G. Desmedt, ed.
-
C. Dwork and M. Naor, "An Efficient Existentially Unforgeable Signature Scheme and Its Applications," Advances in Cryptology - CRYPTO '94, Y.G. Desmedt, ed., pp. 234-246, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '94
, pp. 234-246
-
-
Dwork, C.1
Naor, M.2
-
13
-
-
0038319210
-
-
PhD thesis, Simon Fraser Univ., Burnaby, B.C., Canada
-
A. Fu, "Enhancing Concurrency and Availability for Database Systems," PhD thesis, Simon Fraser Univ., Burnaby, B.C., Canada, 1990.
-
(1990)
Enhancing Concurrency and Availability for Database Systems
-
-
Fu, A.1
-
14
-
-
0022145769
-
How to Assign Votes in a Distributed System
-
H. Garcia-Molina and D. Barbara, "How to Assign Votes in a Distributed System," J. ACM, vol. 32, no. 4, pp. 841-860, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.4
, pp. 841-860
-
-
Garcia-Molina, H.1
Barbara, D.2
-
15
-
-
84969346237
-
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme
-
A.M. Odlyzko, ed.
-
O. Goldreich, "Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme," Advances in Cryptology - CRYPTO '86, A.M. Odlyzko, ed., pp. 104-110, 1987.
-
(1987)
Advances in Cryptology - CRYPTO '86
, pp. 104-110
-
-
Goldreich, O.1
-
16
-
-
33748209465
-
Foundations of Cryptography (Fragments of a Book)
-
Electronic Publication
-
O. Goldreich, "Foundations of Cryptography (Fragments of a Book)," Electronic Colloquium on Computational Complexity, 1995. Electronic Publication: http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html.
-
(1995)
Electronic Colloquium on Computational Complexity
-
-
Goldreich, O.1
-
17
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," J. ACM, vol. 33, pp. 792-807, 1986.
-
(1986)
J. ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks," SIAM J. Computing, vol. 17, no. 2, 1988.
-
SIAM J. Computing
, vol.17
, Issue.2
, pp. 1988
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
19
-
-
0027617271
-
Increasing Availability and Security of an Authentication Service
-
L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE J. Selected Areas Comm., vol. 11, no. 5, pp. 657-662, 1993.
-
(1993)
IEEE J. Selected Areas Comm.
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
23
-
-
0027632662
-
A Theory of Coteries: Mutual Exclusion in Distributed Systems
-
July
-
T. Ibaraki and T. Kameda, "A Theory of Coteries: Mutual Exclusion in Distributed Systems," IEEE Trans. Parallel and Distributed Systems, vol. 4, no. 7, pp. 779-794, July 1993.
-
(1993)
IEEE Trans. Parallel and Distributed Systems
, vol.4
, Issue.7
, pp. 779-794
-
-
Ibaraki, T.1
Kameda, T.2
-
24
-
-
0023543848
-
Secret Sharing Schemes Realizing General Access Structure
-
M. Ito, A. Saito, and T. Nishizeki, "Secret Sharing Schemes Realizing General Access Structure," Proc. IEEE Global Telecomm. Conf. (Globecom '87), pp. 99-102, 1987.
-
(1987)
Proc. IEEE Global Telecomm. Conf. (Globecom '87)
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
25
-
-
0025446697
-
Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database
-
S. Jajodia and D. Mutchler, "Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database," ACM Trans. Database Systems, vol. 15, no. 2, pp. 230-280, 1990.
-
(1990)
ACM Trans. Database Systems
, vol.15
, Issue.2
, pp. 230-280
-
-
Jajodia, S.1
Mutchler, D.2
-
28
-
-
84941862740
-
Hierarchical Quorum Consensus: A New Algorithm for Managing Replicated Data
-
Sept.
-
A. Kumar, "Hierarchical Quorum Consensus: A New Algorithm for Managing Replicated Data," IEEE Trans. Computers, vol. 40, no. 9, pp. 996-1,004, Sept. 1991.
-
(1991)
IEEE Trans. Computers
, vol.40
, Issue.9
-
-
Kumar, A.1
-
29
-
-
0029690941
-
The Fundamental Theorem of Voting Schemes
-
D.E. Loeb, "The Fundamental Theorem of Voting Schemes" J. Combinational Theory, Series A, vol. 7, no. 1, pp. 120-129, 1996.
-
(1996)
J. Combinational Theory, Series A
, vol.7
, Issue.1
, pp. 120-129
-
-
Loeb, D.E.1
-
30
-
-
0001879704
-
Coverings and Colorings of Hypergraphs
-
L. Lovász, "Coverings and Colorings of Hypergraphs," Proc. Fourth Southeastern Conf. Combinatorics, Graph Theory, and Computing, pp. 3-12, 1973.
-
(1973)
Proc. Fourth Southeastern Conf. Combinatorics, Graph Theory, and Computing
, pp. 3-12
-
-
Lovász, L.1
-
32
-
-
0022069122
-
A √n Algorithm for Mutual Exclusion in Decentralized Systems
-
M. Maekawa, "A √n Algorithm for Mutual Exclusion in Decentralized Systems," ACM Trans. Computer Systems, vol. 3, no. 2, pp. 145-159, 1985.
-
(1985)
ACM Trans. Computer Systems
, vol.3
, Issue.2
, pp. 145-159
-
-
Maekawa, M.1
-
33
-
-
84957658795
-
A Simple Method for Generating and Sharing Pseudo-Random Functions for Applications to Clipper-Like Key Escrow Systems
-
D. Coppersmith, ed.
-
S. Micali and R. Sidney, "A Simple Method for Generating and Sharing Pseudo-Random Functions for Applications to Clipper-Like Key Escrow Systems," Advances in Cryptology - CRYPTO '95, D. Coppersmith, ed., pp. 185-196, 1995.
-
(1995)
Advances in Cryptology - CRYPTO '95
, pp. 185-196
-
-
Micali, S.1
Sidney, R.2
-
34
-
-
0002111402
-
Charactérisation des Eléments Ipsoduaux du Treillis Distributif Libre
-
B. Monjardet, "Charactérisation des Eléments Ipsoduaux du Treillis Distributif Libre," C.R. Academie de Science Paris, série A, vol. 274, pp. 12-15, 1972.
-
(1972)
C.R. Academie de Science Paris, Série A
, vol.274
, pp. 12-15
-
-
Monjardet, B.1
-
36
-
-
0002957803
-
The Load, Capacity and Availability of Quorum Systems
-
Apr.
-
M. Naor and A. Wool, "The Load, Capacity and Availability of Quorum Systems," SIAM J. Computing, vol. 27, no. 2, pp. 423-447, Apr. 1998.
-
(1998)
SIAM J. Computing
, vol.27
, Issue.2
, pp. 423-447
-
-
Naor, M.1
Wool, A.2
-
37
-
-
0001030634
-
The Availability of Quorum Systems
-
D. Peleg and A. Wool, "The Availability of Quorum Systems," Information and Computation, vol. 123, no. 2, pp. 210-223, 1995.
-
(1995)
Information and Computation
, vol.123
, Issue.2
, pp. 210-223
-
-
Peleg, D.1
Wool, A.2
-
38
-
-
0043265726
-
The Availability of Crumbling Wall Quorum Systems
-
Apr.
-
D. Peleg and A. Wool, "The Availability of Crumbling Wall Quorum Systems," Discrete Applied Math., vol. 74, no. 1, pp. 69-83, Apr. 1997.
-
(1997)
Discrete Applied Math.
, vol.74
, Issue.1
, pp. 69-83
-
-
Peleg, D.1
Wool, A.2
-
39
-
-
0031072531
-
Crumbling Walls: A Class of Practical and Efficient Quorum Systems
-
D. Peleg and A. Wool, "Crumbling Walls: A Class of Practical and Efficient Quorum Systems," Distributed Computing, vol. 10, no. 2, pp. 87-98, 1997.
-
(1997)
Distributed Computing
, vol.10
, Issue.2
, pp. 87-98
-
-
Peleg, D.1
Wool, A.2
-
41
-
-
0028429699
-
How to Securely Replicate Services
-
M.K. Reiter and K.P. Birman, "How to Securely Replicate Services," ACM Trans. Programming Language Systems, vol. 16, no. 3, pp. 986-1,009, 1994.
-
(1994)
ACM Trans. Programming Language Systems
, vol.16
, Issue.3
-
-
Reiter, M.K.1
Birman, K.P.2
-
42
-
-
0002411371
-
What Good Are Models and What Models Are Good?
-
S. Mullender, ed., ACM Press/Addison-Wesley
-
F.B. Schneider, "What Good Are Models and What Models Are Good?" Distributed Systems, S. Mullender, ed., pp. 17-26. ACM Press/Addison-Wesley, 1993.
-
(1993)
Distributed Systems
, pp. 17-26
-
-
Schneider, F.B.1
-
43
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
44
-
-
0003038453
-
An Introduction to Shared Secret and/or Shared Control Schemes and Their Application
-
IEEE Press
-
G.J. Simmons, "An Introduction to Shared Secret and/or Shared Control Schemes and Their Application," Contemporary Cryptology, The Science of Information Integrity, pp. 441-497. IEEE Press, 1992.
-
(1992)
Contemporary Cryptology, The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
45
-
-
0001857259
-
An Overview of Clock Synchronization
-
B. Simons and A. Spector, eds. Springer-Verlag
-
B. Simons, J.L. Welch, and N. Lynch, "An Overview of Clock Synchronization," Fault-Tolerant Distributed Computing, B. Simons and A. Spector, eds. Springer-Verlag, 1990.
-
(1990)
Fault-Tolerant Distributed Computing
-
-
Simons, B.1
Welch, J.L.2
Lynch, N.3
-
46
-
-
0001636850
-
Kerberos: An Authentication Service for Open Networks
-
Dallas, Tex.
-
J. Steiner, B.C. Neuman, and J.L. Schiller, "Kerberos: An Authentication Service for Open Networks," Proc. Winter USENIX Conf., Dallas, Tex., 1988.
-
(1988)
Proc. Winter USENIX Conf.
-
-
Steiner, J.1
Neuman, B.C.2
Schiller, J.L.3
-
47
-
-
0018480001
-
A Majority Consensus Approach to Concurrency Control for Multiple Copy Databases
-
R.H. Thomas, "A Majority Consensus Approach to Concurrency Control for Multiple Copy Databases," ACM Trans. Database Systems, vol. 4, no. 2, pp. 180-209, 1979.
-
(1979)
ACM Trans. Database Systems
, vol.4
, Issue.2
, pp. 180-209
-
-
Thomas, R.H.1
-
48
-
-
0000378392
-
Short Monotone Formulae for the Majority Function
-
L.G. Valiant, "Short Monotone Formulae for the Majority Function," J. Algorithms, vol. 5, pp. 363-366, 1984.
-
(1984)
J. Algorithms
, vol.5
, pp. 363-366
-
-
Valiant, L.G.1
|