-
1
-
-
84898960610
-
Completeness theorems for non- cryptographic fault-tolerant distributed computing
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non- cryptographic fault-tolerant distributed computing. In: Proc. ACM STOC, '88, pages 1-10, ACM Press, 1988.
-
(1988)
Proc. ACM STOC, '88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
0345872645
-
Trust and Security: A New Look at the Byzantine Generals Problem
-
American Mathematical Society
-
M. Burmester, Y. Desmedt, and G. Kabatianski. Trust and Security: A New Look at the Byzantine Generals Problem. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 38, pages 75-83, American Mathematical Society, 1998.
-
(1998)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.38
, pp. 75-83
-
-
Burmester, M.1
Desmedt, Y.2
Kabatianski, G.3
-
3
-
-
84958644011
-
Using approximation hardness to achieve dependable computation
-
Springer Verlag
-
M. Burmester, Y. Desmedt, and Y. Wang. Using approximation hardness to achieve dependable computation. In: Proc. of the Second International Conference on Randomization and Approximation Techniques in Computer Science, LNCS 1518, pages 172-186, Springer Verlag, 1998.
-
(1998)
Proc. of the Second International Conference on Randomization and Approximation Techniques in Computer Science
, vol.1518
, pp. 172-186
-
-
Burmester, M.1
Desmedt, Y.2
Wang, Y.3
-
4
-
-
84898947315
-
Multiparty unconditional secure proto- cols
-
ACM Press
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditional secure proto- cols. In: Proc. ACM STOC, '88, pages 11-19, ACM Press, 1988.
-
(1988)
Proc. ACM STOC, '88
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
5
-
-
0013259203
-
A simple and key-economical unconditional authentication scheme
-
B. den Boer. A simple and key-economical unconditional authentication scheme. Journal of Computer Security, 2:65-71, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 65-71
-
-
Den Boer, B.1
-
6
-
-
0009768331
-
The Byzantine generals strike again
-
D. Dolev. The Byzantine generals strike again. J. of Algorithms, 3:14-30, 1982.
-
(1982)
J. of Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
7
-
-
0027341860
-
Perfectly secure message transmis- sion
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmis- sion. J. of the ACM, 40(1):17-47, 1993.
-
(1993)
J. of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
8
-
-
84957653101
-
Secure communication in minimal connectivity models
-
Springer Verlag
-
M. Franklin and N. Wright. Secure communication in minimal connectivity models. In: Advances in Cryptology, Proc. of Euro Crypt '98, LNCS 1403, pages 346-360, Springer Verlag, 1998.
-
(1998)
Advances in Cryptology, Proc. of Euro Crypt '98
, vol.1403
, pp. 346-360
-
-
Franklin, M.1
Wright, N.2
-
9
-
-
1142282324
-
Secure hypergraphs: Privacy from partial broadcast
-
ACM Press
-
M. Franklin and M. Yung. Secure hypergraphs: privacy from partial broadcast. In: Proc. ACM STOC, '95, pages 36-44, ACM Press, 1995.
-
(1995)
Proc. ACM STOC, '95
, pp. 36-44
-
-
Franklin, M.1
Yung, M.2
-
10
-
-
0016038540
-
Codes which detect deception
-
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3):405-424, 1974.
-
(1974)
The BELL System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
Macwilliams, F.2
Sloane, N.3
-
11
-
-
1542674248
-
Fault-tolerant computation in the full information model
-
O. Goldreich, S. Goldwasser, and N. Linial. Fault-tolerant computation in the full information model. SIAM J. Comput. 27(2):506-544, 1998.
-
(1998)
SIAM J. Comput
, vol.27
, Issue.2
, pp. 506-544
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
13
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
T. Rabin. Robust sharing of secrets when the dealer is honest or faulty. J. of the ACM, 41(6):1089-1109, 1994.
-
(1994)
J. of the ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
14
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM Press
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. ACM STOC, '89, pages 73-85, ACM Press, 1989.
-
(1989)
Proc. ACM STOC, '89
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|