-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
R.E. Merwin, et al. eds., Sept.
-
G.R. Blakley, "Safeguarding Cryptographic Keys," Proc. 1979 Nat'l Computer COnf., R.E. Merwin, et al. eds., pp. 313-317, Sept. 1979.
-
(1979)
Proc. 1979 Nat'l Computer COnf.
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
M. Blaze, J. Feigenbaum, and A.D. Keromytis, "KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)," Lecture Notes in Computer Science, vol. 1550, pp. 59-63, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, et al., eds.
-
D. Chaum, "Blind Signatures for Untraceable Payments," Proc. Advances in Cryptology (Crypto '82) Workshop the Theory and Application of Cryptography, D. Chaum, et al., eds., pp. 199-203, 1983.
-
(1983)
Proc. Advances in Cryptology (Crypto '82) Workshop the Theory and Application of Cryptography
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
12344278359
-
Key escrow in mutually mistrusting domains
-
T.M.A. Lomas, ed., Apr.
-
L. Chen, D. Gollmann, and C.J. Mitchell, "Key Escrow in Mutually Mistrusting Domains," Proc. Int'l Workshop Security Protocols, T.M.A. Lomas, ed., Apr. 1996.
-
(1996)
Proc. Int'l Workshop Security Protocols
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.J.3
-
6
-
-
0028462933
-
Threshold cryptography
-
July-Aug.
-
Y. Desmedt, "Threshold Cryptography," European Trans. Telecomm., vol. 5, no. 4, pp. 449-457, July-Aug. 1994.
-
(1994)
European Trans. Telecomm.
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
7
-
-
12344285006
-
Some recent research aspects of threshold cryptography
-
E. Okamoto, et al., eds., Feb.
-
Y. Desmedt, "Some Recent Research Aspects of Threshold Cryptography," Proc. First Int'l Workshop Information Security (ISW '97), E. Okamoto, et al., eds., Feb. 1998.
-
(1998)
Proc. First Int'l Workshop Information Security (ISW '97)
-
-
Desmedt, Y.1
-
10
-
-
0026155432
-
Intrusion tolerance in distributed computing systems
-
May
-
Y. Deswarte, L. Blain, and J.-C. Fabre, "Intrusion Tolerance in Distributed Computing Systems," Proc. Symp. Research in Security and Privacy, pp. 110-121, May 1991.
-
(1991)
Proc. Symp. Research in Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.-C.3
-
11
-
-
0034318740
-
Scalable secure one-to-many group communication using dual encryption
-
Nov.
-
L. Dondeti, S. Mukherjee, and A. Samal, "Scalable Secure One-to-Many Group Communication Using Dual Encryption," Computer Comm., vol. 23, no. 17, pp. 1681-1701, Nov. 2000.
-
(2000)
Computer Comm.
, vol.23
, Issue.17
, pp. 1681-1701
-
-
Dondeti, L.1
Mukherjee, S.2
Samal, A.3
-
12
-
-
84874800178
-
A public-key cryptoSystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
0013443796
-
Multimedia security in group communications: Recent progress in wired and wireless networks
-
Nov.
-
A. Eskicioglu, "Multimedia Security in Group Communications: Recent Progress in Wired and Wireless Networks," Proc. IASTED Int'l Conf. Comm. and Computer Networks, pp. 125-133, Nov. 2002.
-
(2002)
Proc. IASTED Int'l Conf. Comm. and Computer Networks
, pp. 125-133
-
-
Eskicioglu, A.1
-
14
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
Apr.
-
M.J. Fischer, N.A. Lynch, and M.S. Paterson, "Impossibility of Distributed Consensus with One Faulty Process," J. ACM, vol. 32, no. 2, pp. 374-382, Apr. 1985.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
15
-
-
0022282327
-
A fault and intrusion-tolerant file system
-
J. Crimson and H.-J. Kugler, eds., Aug.
-
J. Fraga and D. Powell, "A Fault and Intrusion-Tolerant File System," Proc. Third IFIP Int'l Conf. Computer Security (IFIP/Sec '85), J. Crimson and H.-J. Kugler, eds., pp. 203-218, Aug. 1985.
-
(1985)
Proc. Third IFIP Int'l Conf. Computer Security (IFIP/Sec '85)
, pp. 203-218
-
-
Fraga, J.1
Powell, D.2
-
16
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Oct.
-
Y. Frankel, P. Gemmel, P. MacKenzie, and M. Yung, "Optimal Resilience Proactive Public-Key Cryptosystems," Proc. 38th Symp. Foundations of Computer Science, pp. 384-393, Oct. 1997.
-
(1997)
Proc. 38th Symp. Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
MacKenzie, P.3
Yung, M.4
-
17
-
-
11844281095
-
Proactive RSA
-
B.S. Kaliski Jr., ed.
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung, "Proactive RSA," Proc. Conf. Advances in Cryptology (Crypto '97), B.S. Kaliski Jr., ed., 1997.
-
(1997)
Proc. Conf. Advances in Cryptology (Crypto '97)
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.3
Yung, M.4
-
18
-
-
12344334569
-
Distributed public key cryptosystem
-
H. Imai and Y. Zheng, eds.
-
Y. Frankel and M. Yung, "Distributed Public Key Cryptosystem," Proc. First Int'l Workshop Practice and Theory in Public Key Cryptography, (PKC '98), H. Imai and Y. Zheng, eds., 1998.
-
(1998)
Proc. First Int'l Workshop Practice and Theory in Public Key Cryptography, (PKC '98)
-
-
Frankel, Y.1
Yung, M.2
-
19
-
-
0012577752
-
Secure distributed storage and retrieval
-
July
-
J.A. Garay, R. Gennaro, C. Jutla, and T. Rabin, "Secure Distributed Storage and Retrieval," Theoretical Computer Science, vol. 243, nos. 1-2, pp. 363-389, July 2000.
-
(2000)
Theoretical Computer Science
, vol.243
, Issue.1-2
, pp. 363-389
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
20
-
-
0027617271
-
Increasing availability and security of an authentication service
-
June
-
L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE J. Selected Areas in Comm., vol. 11, no. 5, pp. 657- 662, June 1993.
-
(1993)
IEEE J. Selected Areas in Comm.
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
23
-
-
0031650454
-
Access control in an open distributed environment
-
May
-
R. Hayton, J. Bacon, and K. Moody, "Access Control in an Open Distributed Environment," Proc. 1998 IEEE Symp. Security and Privacy, pp. 3-14, May 1998.
-
(1998)
Proc. 1998 IEEE Symp. Security and Privacy
, pp. 3-14
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
24
-
-
0030646698
-
Proactive public-key and signature schemes
-
Apr.
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Public-Key and Signature Schemes," Proc. Fourth Ann. Conf. Computer Comm. Security, pp. 100-110, Apr. 1997.
-
(1997)
Proc. Fourth Ann. Conf. Computer Comm. Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
25
-
-
0000299804
-
Proactive secret sharing or: How to cope with perpetual leakage
-
D. Coppersmith, ed.
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Proc. 15th Ann. Int'l Cryptology Conf. (Crypto '95, D. Coppersmith, ed., 1995.
-
(1995)
Proc. 15th Ann. Int'l Cryptology Conf. Crypto '95
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
27
-
-
0010316932
-
-
master's thesis, Dept. of Electrical Eng. and Computer Science, Massachusetts Inst. of Technology, Cambridge, Sept.
-
S. Jarecki, "Proactive Secret Sharing and Public Key Cryptosystems," master's thesis, Dept. of Electrical Eng. and Computer Science, Massachusetts Inst. of Technology, Cambridge, Sept. 1995.
-
(1995)
Proactive Secret Sharing and Public Key Cryptosystems
-
-
Jarecki, S.1
-
28
-
-
0032306029
-
Byzantine quorum systems
-
D. Malkhi and M. Reiter, "Byzantine Quorum Systems," Distributed Computing, vol. 11, no. 4, pp. 203-213, 1998.
-
(1998)
Distributed Computing
, vol.11
, Issue.4
, pp. 203-213
-
-
Malkhi, D.1
Reiter, M.2
-
29
-
-
0005090935
-
Distributed pseudo-random functions and KDCs
-
J. Stern, ed.
-
M. Naor, B. Pinkas, and O. Reingold, "Distributed Pseudo-Random Functions and KDCs," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '99), J. Stern, ed., 1999.
-
(1999)
Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '99)
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
33
-
-
0030376048
-
The key management service
-
M.K. Reiter, M.K. Franklin, J.B. Lacy, and R.N. Wright, "The Key Management Service," J. Computer Security, vol. 4, no. 4, pp. 267-297, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.4
, pp. 267-297
-
-
Reiter, M.K.1
Franklin, M.K.2
Lacy, J.B.3
Wright, R.N.4
-
34
-
-
0017930809
-
A method of obtaining digital signature and public key systems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method of Obtaining Digital Signature and Public Key Systems," Comm. ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
36
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr, "Efficient Signature Generation by Smart Cards, " J. Cryptology: The J. Int'l Assoc. for Cryptologic Research, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptology: The J. Int'l Assoc. for Cryptologic Research
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
38
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
39
-
-
12344290414
-
Distributed blinding for ElGamal re-encryption
-
Cornell Univ., Ithaca, New York, Jan.
-
L. Zhou, M.A. Marsh, F.B. Schneider, and A. Redz, "Distributed Blinding for ElGamal Re-Encryption," Technical Report TR 2004-1920, Cornell Univ., Ithaca, New York, Jan. 2004.
-
(2004)
Technical Report
, vol.TR 2004-1920
-
-
Zhou, L.1
Marsh, M.A.2
Schneider, F.B.3
Redz, A.4
-
40
-
-
0345757359
-
COCA: A secure distributed online certification authority
-
L. Zhou, F.B. Schneider, and R. van Renesse, "COCA: A Secure Distributed Online Certification Authority," ACM Trans. Computer Systems (TOCS), vol. 20, no. 4, pp. 329-368, 2002.
-
(2002)
ACM Trans. Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
-
41
-
-
12344282882
-
Proactive secret sharing in asynchronous systems
-
Cornell Univ., Ithaca, New York, Oct.
-
L. Zhou, F.B. Schneider, and R. van Renesse, "Proactive Secret Sharing in Asynchronous Systems," Technical Report TR 2002-1877, Cornell Univ., Ithaca, New York, Oct. 2002.
-
(2002)
Technical Report
, vol.TR 2002-1877
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|