-
4
-
-
0034828969
-
Log auditing through model checking
-
In Press, I. C. S., Editor
-
M. Roger and J. Goubault-Larrecq, "Log Auditing through Model Checking." In Press, I. C. S., editor, Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW'01), pp. 220-236, 2001.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 220-236
-
-
Roger, M.1
Goubault-Larrecq, J.2
-
7
-
-
84952535645
-
Providing auditing while protecting privacy
-
L. Jean Camp and J.D. Tygar, "Providing Auditing While Protecting Privacy." The Information Society, 10(1), pp. 59-72, 1998.
-
(1998)
The Information Society
, vol.10
, Issue.1
, pp. 59-72
-
-
Jean Camp, L.1
Tygar, J.D.2
-
9
-
-
0342537489
-
Varieties of secure distributed computing
-
M. Franklin and M. Yung, "Varieties of Secure Distributed Computing." In Proceedings of Sequences II, Methods in Communications, Security and Computer Science, pp. 392-417, 1996.
-
(1996)
Proceedings of Sequences II, Methods in Communications, Security and Computer Science
, pp. 392-417
-
-
Franklin, M.1
Yung, M.2
-
11
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority.", In Proceedings of the 19th ACM Symposium on Theory of Computing, pp. 218 - 229, 1987.
-
(1987)
Proceedings of the 19th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computation." In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC'88, pp. 1-10, 1988.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC'88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
14
-
-
84979502594
-
Security with low communication overhead
-
D. Beaver, J. Feigenbaum, J. Kilian and P. Rogaway, "Security with Low Communication Overhead." Crytpo'90, pp. 62-76, 1990.
-
(1990)
Crytpo'90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
16
-
-
85014508412
-
Multiparty computation with faulty majority
-
Berlin, Aug. Springer
-
D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Advances in Cryptology: CRYPTO '89, pages 589-590, Berlin, Aug. 1990. Springer.
-
(1990)
Advances in Cryptology: CRYPTO '89
, pp. 589-590
-
-
Beaver, D.1
Goldwasser, S.2
-
17
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
LNCS 1592
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin, "Efficient Multiparty Computations Secure Against an Adaptive Adversary." Advances in Cryptology - EUROCRYPT '99, LNCS 1592, pp. 311-326, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
18
-
-
35248861868
-
Efficient secure multi-party computation
-
LNCS 1976
-
M. Hirt, U. Maurer, and B. Przydatek, "Efficient Secure Multi-Party Computation." Advances in Cryptology - ASIACRYPT '00, LNCS 1976, pp. 143-161, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT '00
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
19
-
-
17444394365
-
Simplified VSS and fast-track multi-party computations with applications to threshold cryptography
-
R. Gennaro, M. Rabin, T. Rabin, "Simplified VSS and Fast-Track Multi-party Computations with Applications to Threshold Cryptography." ACM PODC'98, 1998.
-
(1998)
ACM PODC'98
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
21
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. C. Pohlig and M. E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance." IEEE Trans. Inform. Theory IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Inform. Theory IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
23
-
-
0030150177
-
Comparing information without leaking it
-
R. Fagin, M. Naor and P. Winkler, "Comparing Information without Leaking It." Communication of the ACM, 39, pp. 77-85, 1996
-
(1996)
Communication of the ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
25
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier and J. Kelsey, "Secure Audit Logs to Support Computer Forensics.", ACM Transactions on Information and System Security, 2(2), pp. 159-176, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
28
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. Neumann and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications Magazine, 32(9), pp 33-38, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neumann, B.1
Ts'o, T.2
-
30
-
-
2442442207
-
On the evidence based peer-to-peer resource management in distributed computing system
-
Department of Computer Science, Texas A & M University
-
T.C. Lam and Jyh-Cham Liu "On the Evidence based Peer-to-Peer Resource Management in Distributed Computing System" Technical Report 2003-7-2, Department of Computer Science, Texas A & M University, 2003.
-
(2003)
Technical Report 2003-7-2
-
-
Lam, T.C.1
Liu, J.-C.2
|