-
1
-
-
0037548801
-
-
The Aware Home Research Initiative
-
The Aware Home Research Initiative, http://www.cc.gatech.edu/fce/ahri/, 2000.
-
(2000)
-
-
-
3
-
-
0018545449
-
How to share a secret
-
Shamir A., "How to Share a Secret", Communications of the ACM, 22, 1979, pp.612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
84976699318
-
The byzantine generals problem
-
Lamport L., Shostak R., Pease M., "The Byzantine Generals Problem", ACM Transactions on Programming Languages and Systems, 4(3), 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
5
-
-
84957626176
-
Proactive secret sharing
-
D. Coppersmith, Ed.; Springer-Verlag
-
Herzberg A., Jarecki S., Krawczyk H., and Yung M., "Proactive secret sharing," Advances in Cryptology, Crypto '95, Lecture Notes in Computer Science, 963, D. Coppersmith, Ed., 1995, Springer-Verlag.
-
(1995)
Advances in Cryptology, Crypto '95, Lecture Notes in Computer Science
, vol.963
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
6
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
December
-
Schneider F., "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial", ACM Computing Surveys, Vol. 22, No. 4, December 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
-
-
Schneider, F.1
-
8
-
-
0037548799
-
-
Scalable and Survivable Data Replication: The Fleet Project
-
Scalable and Survivable Data Replication: The Fleet Project, http://www.bell-labs.com/user/reiter/fleet/.
-
-
-
-
9
-
-
0034590169
-
Dynamic byzantine quorum systems
-
Alvisi L., Malkhi D., Pierce E., Reiter M., Wright R., "Dynamic Byzantine Quorum Systems", Proc. International Conference on Dependable Systems and Networks, June 2000.
-
Proc. International Conference on Dependable Systems and Networks, June 2000
-
-
Alvisi, L.1
Malkhi, D.2
Pierce, E.3
Reiter, M.4
Wright, R.5
-
10
-
-
85062838317
-
Safeguarding cryptographic keys
-
Blakley G., "Safeguarding Cryptographic Keys", Proc. Nat'l Computer Conf., American Federation of Information Processing Societies, Montvale, N.J., 1979, pp. 313-317.
-
Proc. Nat'l Computer Conf., American Federation of Information Processing Societies, Montvale, N.J., 1979
, pp. 313-317
-
-
Blakley, G.1
-
11
-
-
0024641589
-
Efficient dispersal of information for security, load balancing and fault tolerance
-
Rabin M., "Efficient dispersal of information for security, load balancing and fault tolerance, Journal of the ACM, 36(2):335-348, 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
15
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Pederson T.P., "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", Proc. Crypto'91, LNCS 576, pp. 129-140.
-
Proc. Crypto'91, LNCS 576
, pp. 129-140
-
-
Pederson, T.P.1
-
16
-
-
0342410321
-
Survivable information storage systems
-
August
-
Wylie J.J., Bigrigg M.W., Strunk J.D, Ganger D.R., Kiliccote H., and Khosla P.K., "Survivable information storage systems", IEEE Computer, 33(8):61-68, August 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, D.R.4
Kiliccote, H.5
Khosla, P.K.6
-
17
-
-
85030178366
-
Epidemic algorithms for replicated database maintenance
-
Demers A., Greene D., Hauser C., Irish W., Larson J., Shenker S., Sturgis H., Swinehart D, and Terry D., "Epidemic algorithms for replicated database maintenance", Proc. 6th Symposium on Principles of Distributed Computing, pp. 1-12, 1987.
-
(1987)
Proc. 6th Symposium on Principles of Distributed Computing
, pp. 1-12
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
19
-
-
84956986541
-
Optimal unconditional information diffusion
-
Lisbon, Portugal
-
Malkhi D., Pavlov E., Sella Y., "Optimal Unconditional Information Diffusion", Proceedings of the 15th International Symposium on Distributed Computing, pages 63-77, Lisbon, Portugal, 2001.
-
(2001)
Proceedings of the 15th International Symposium on Distributed Computing
, pp. 63-77
-
-
Malkhi, D.1
Pavlov, E.2
Sella, Y.3
-
20
-
-
0038562860
-
Tolerating malicious gossip
-
Technical Report, Cornell Computer Science TR2001-1853
-
Minsky Y., Schneider F., "Tolerating Malicious Gossip", to appear in Distributed Computing, Technical Report, Cornell Computer Science TR2001-1853.
-
Distributed Computing
-
-
Minsky, Y.1
Schneider, F.2
-
21
-
-
0022564904
-
Intrusion-tolerance using fine-grain fragmentation-scattering
-
Fray JM., Deswarte Y. and Powell D., "Intrusion-tolerance using fine-grain fragmentation-scattering", Proc. 1986 IEEE Symposium on Security and Privacy, Oakland (CA), April 1986.
-
Proc. 1986 IEEE Symposium on Security and Privacy, Oakland (CA), April 1986
-
-
Fray, J.M.1
Deswarte, Y.2
Powell, D.3
-
22
-
-
0035789777
-
A secure and highly available distributed store for meeting diverse data storage needs
-
Lakshmanan S., Ahamad M., H. Venkateswaran, "A secure and highly available distributed store for meeting diverse data storage needs", Proc. 2001 International Conference on Dependable Systems and Networks, Goteborg, Sweden, July 2001.
-
Proc. 2001 International Conference on Dependable Systems and Networks, Goteborg, Sweden, July 2001
-
-
Lakshmanan, S.1
Ahamad, M.2
Venkateswaran, H.3
-
24
-
-
85028775022
-
Secret sharing made short
-
D. R. Stinson, ed., Lecture Notes in Computer Science 773
-
Hugo Krawczyk, "Secret sharing made short", in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lecture Notes in Computer Science 773 (1994), 136-146.
-
(1994)
Advances in Cryptology - CRYPTO '93
, pp. 136-146
-
-
Krawczyk, H.1
-
26
-
-
0032162620
-
Access control and signatures via quorum secret sharing
-
Moni Naor and Avishai Wool, "Access Control and Signatures via Quorum Secret Sharing", IEEE Trans. Parallel and Distributed Sys 9(9), 1998.
-
(1998)
IEEE Trans. Parallel and Distributed Sys
, vol.9
, Issue.9
-
-
Naor, M.1
Wool, A.2
|