메뉴 건너뛰기




Volumn 220, Issue 1, 1999, Pages 185-210

Reliable communication over partially authenticated networks

Author keywords

Authentication keys; Byzantine failures; Graph connectivity; Private communication; Reliable communication

Indexed keywords


EID: 0346396336     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0304-3975(98)00241-2     Document Type: Article
Times cited : (20)

References (19)
  • 2
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. Carter, M. Wegman, Universal classes of hash functions, J. Comput. System Sci. 18 (1979) 143-154.
    • (1979) J. Comput. System Sci. , vol.18 , pp. 143-154
    • Carter, J.1    Wegman, M.2
  • 4
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev, The Byzantine generals strike again, J. Algorithms 3 (1982) 14-30.
    • (1982) J. Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 5
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts, M. Yung, Perfectly secure message transmission, J. ACM 40 (1) (1993) 17-47.
    • (1993) J. ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 6
    • 0024091299 scopus 로고
    • Fault tolerance in networks of bounded degree
    • C. Dwork, D. Peleg, N. Pippenger, E. Upfal, Fault tolerance in networks of bounded degree, SIAM J. Comput. 17 (5) (1988) 975-988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.5 , pp. 975-988
    • Dwork, C.1    Peleg, D.2    Pippenger, N.3    Upfal, E.4
  • 7
    • 0004201430 scopus 로고
    • Computer Science Press, Rockville, MD
    • S. Even, Graph Algorithms, Computer Science Press, Rockville, MD, 1979.
    • (1979) Graph Algorithms
    • Even, S.1
  • 8
    • 0022562351 scopus 로고
    • Easy impossibility proofs for distributed consensus problems
    • M.J. Fischer, N.A. Lynch, M. Merritt, Easy impossibility proofs for distributed consensus problems, Distrib. Computing 1 (1) (1986) 26-39.
    • (1986) Distrib. Computing , vol.1 , Issue.1 , pp. 26-39
    • Fischer, M.J.1    Lynch, N.A.2    Merritt, M.3
  • 10
    • 0012683323 scopus 로고    scopus 로고
    • Special section on group communication
    • D. Powell (Guest Ed.), Special section on group communication, Comm. CACM 39 (4) (1996).
    • (1996) Comm. CACM , vol.39 , Issue.4
    • Powell, D.1
  • 11
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Y.G. Desmedt (Ed.), Advances in Cryptology - CRYPTO '94, Springer, Berlin
    • H. Krawczyk, in: Y.G. Desmedt (Ed.), LFSR-based hashing and authentication, Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, 129-139.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 12
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • L.C. Guillou, J.-J. Quisquater (Eds.), Advances in cryptology: EUROCRYPT '95, Springer, Berlin
    • H. Krawczyk, New hash functions for message authentication, in: L.C. Guillou, J.-J. Quisquater (Eds.), Advances in cryptology: EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, Springer, Berlin, 1995, pp. 301-310.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 301-310
    • Krawczyk, H.1
  • 14
    • 0002439168 scopus 로고    scopus 로고
    • Allgemeinen kurventheorie
    • K. Menger, Allgemeinen kurventheorie, Fund. Math. 10 (1997) 96-115.
    • (1997) Fund. Math. , vol.10 , pp. 96-115
    • Menger, K.1
  • 15
    • 84976810569 scopus 로고
    • Reaching agreements in the presence of faults
    • M. Pease, R. Shostak, L. Lamport, Reaching agreements in the presence of faults, J. ACM 27 (2): 228-234. (1980).
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 18
    • 0012609620 scopus 로고
    • Tolerating a linear number of faults in networks of bounded degree
    • E. Upfal, Tolerating a linear number of faults in networks of bounded degree, Inform. and Comput. 115 (2) (1994) 312-320.
    • (1994) Inform. and Comput. , vol.115 , Issue.2 , pp. 312-320
    • Upfal, E.1
  • 19
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman, J. Carter, New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22 (1981) 265-279.
    • (1981) J. Comput. System Sci. , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.