-
1
-
-
84883303431
-
Measurements of a distributed file system
-
Association for Computing Machinery SIGOPS
-
Mary G. Baker, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, and John K. Ousterhout. Measurements of a Distributed File System. In Proceedings of 13th ACM Symposium on Operating Systems Principles, pages 198-212. Association for Computing Machinery SIGOPS, 1991.
-
(1991)
Proceedings of 13th ACM Symposium on Operating Systems Principles
, pp. 198-212
-
-
Baker, M.G.1
Hartman, J.H.2
Kupfer, M.D.3
Shirriff, K.W.4
Ousterhout, J.K.5
-
2
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of chamn's blind signature scheme
-
Mihir Bellare, Chanathip Namprempre, David Pointcheval, and Michael Senmnko. The One-More-RSA-Inversion Problems and the Security of Chamn's Blind Signature Scheme. Journal of Cryptology, 16(3):185-215, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Senmnko, M.4
-
3
-
-
85001025766
-
Wallet databases with observers
-
CRYPTO. Springer-Verlag
-
David Chaum and Torben P. Pedersen. Wallet Databases with Observers. In CRYPTO, volume 740 of Lecture Notes in Computer Science, pages 89-105. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
4
-
-
24144467818
-
Efficient threshold RSA signatures with general moduli and no extra assumptions
-
Public Key Cryptography. Springer-Verlag
-
Ivan Damgård and Kasper Dupont. Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. In Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, pages 346-361. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 346-361
-
-
Damgård, I.1
Dupont, K.2
-
5
-
-
85023809951
-
Threshold cryptosystems
-
CRYPTO. Springer-Verlag
-
Yvo Desmedt and Yair Frankel. Threshold Cryptosystems. In CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 307-315. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
6
-
-
85028913061
-
On-line/off-line digital schemes
-
CRYPTO. Springer-Verlag
-
Shimon Even, Oded Goldreich, and Silvio Micali. On-Line/Off-Line Digital Schemes. In CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 263-275. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
7
-
-
84941152623
-
Secure distributed key generation for discrete logarithm cryptosystems
-
To appear
-
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Secure Distributed Key Generation for Discrete Logarithm Cryptosystems. To appear, Journal of Cryptology. http://www.research.ibm.com/security/dkg03.ps.
-
Journal of Cryptology
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
0035835293
-
Robust threshold DSS signatures
-
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Robust Threshold DSS Signatures. Inf. Comput., 164(1):54-84, 2001.
-
(2001)
Inf. Comput.
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
10
-
-
0039927469
-
OceanStore: An architecture for global-scale persistent storage
-
Novemeber
-
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In Proceedings of ACM Architectural Support for Programming Languages and Operating Systems, Novemeber 2000.
-
(2000)
Proceedings of ACM Architectural Support for Programming Languages and Operating Systems
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
11
-
-
84920380941
-
Protocols for public key cryptosystems
-
April
-
Ralph Merkle. Protocols for Public Key Cryptosystems. In IEEE Symposium on Security and Privacy, pages 122-134, April 1980.
-
(1980)
IEEE Symposium on Security and Privacy
, pp. 122-134
-
-
Merkle, R.1
-
12
-
-
84943547553
-
Pond: The OceanStore prototype
-
USENIX
-
Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz. Pond: The OceanStore Prototype. In Proceedings of the Conference on File and Storage Technologies. USENIX, 2003.
-
(2003)
Proceedings of the Conference on File and Storage Technologies
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
14
-
-
0026812659
-
The design and implementation of a log-structured file system
-
February
-
Mendel Rosenblum and John K. Ousterhout. The Design and Implementation of a Log-Structured File System. In ACM Transactions on Computer Systems, volume 10, pages 26-52, February 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, pp. 26-52
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
16
-
-
84880883264
-
Improved online/offline signature schemes
-
CRYPTO. Springer-Verlag
-
Adi Shamir and Yael Tauman. Improved Online/Offline Signature Schemes. In CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 355-367. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
17
-
-
84948954277
-
Practical threshold signatures
-
EUROCRYPT. Springer-Verlag
-
Victor Shoup. Practical Threshold Signatures. In EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, pages 207-220. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
18
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Chung Kei Wong and Simon S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. Netw., 7(4):502-513, 1999.
-
(1999)
IEEE/ACM Trans. Netw.
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.S.2
-
20
-
-
0345757359
-
COCA: A secure distributed online certification authority
-
Lidong Zhou, Fred B. Schneider, and Robbert van Renesse. COCA: A Secure Distributed Online Certification Authority. ACM Trans. Computer Systems, 20(4):329-368, 2002.
-
(2002)
ACM Trans. Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|