-
1
-
-
37049009792
-
Scalable secure storage when half the system is faulty
-
Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP), Springer
-
N. Alon, H. Kaplan, M. Krivelevich, D. Malkhi, and J. P. Stern, "Scalable secure storage when half the system is faulty," in Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP), vol. 1853 of Lecture Notes in Computer Science, pp. 576-587, Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 576-587
-
-
Alon, N.1
Kaplan, H.2
Krivelevich, M.3
Malkhi, D.4
Stern, J.P.5
-
2
-
-
33749380311
-
Addendum to scalable secure storage when half the system is faulty
-
To appear
-
N. Alon, H. Kaplan, M. Krivelevich, D. Malkhi, and J. P. Stern, "Addendum to scalable secure storage when half the system is faulty," Information and Computation, 2004. To appear.
-
(2004)
Information and Computation
-
-
Alon, N.1
Kaplan, H.2
Krivelevich, M.3
Malkhi, D.4
Stern, J.P.5
-
5
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl, "Asynchronous verifiable secret sharing and proactive cryptosystems," in Proc. 9th ACM Conference on Computer and Communications Security (CCS), pp. 88-97, 2002.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security (CCS)
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
6
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols
-
Advances in Cryptology: CRYPTO 2001 Springer
-
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup, "Secure and efficient asynchronous broadcast protocols (extended abstract)," in Advances in Cryptology: CRYPTO 2001. vol. 2139 of Lecture Notes in Computer Science, pp. 524-541, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
7
-
-
84867149301
-
Asynchronous verifiable information dispersal
-
IBM Research, Dec.
-
C. Cachin and S. Tessaro, "Asynchronous verifiable information dispersal," Research Report RZ 3569, IBM Research, Dec. 2004.
-
(2004)
Research Report
, vol.RZ 3569
-
-
Cachin, C.1
Tessaro, S.2
-
8
-
-
33646419451
-
Optimal resilience for erasurecoded Byzantine distributed storage
-
IBM Research, Feb.
-
C. Cachin and S. Tessaro, "Optimal resilience for erasurecoded Byzantine distributed storage," Research Report RZ 3575, IBM Research, Feb. 2005.
-
(2005)
Research Report
, vol.RZ 3575
-
-
Cachin, C.1
Tessaro, S.2
-
10
-
-
0012577752
-
Secure distributed storage and retrieval
-
J. A. Garay, R. Gennaro, C. Jutla, and T. Rabin, "Secure distributed storage and retrieval," Theoretical Computer Science, vol. 243, no. 1-2, pp. 363-389, 2000.
-
(2000)
Theoretical Computer Science
, vol.243
, Issue.1-2
, pp. 363-389
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
12
-
-
4544293523
-
Efficient Byzantine-tolerant erasure-coded storage
-
G. R. Goodson, J. J. Wylie, G. R. Ganger, and M. K. Reiter, "Efficient Byzantine-tolerant erasure-coded storage," in Proc. International Conference on Dependable Systems and Networks (DSN-2004), pp. 135-144, 2004.
-
(2004)
Proc. International Conference on Dependable Systems and Networks (DSN-2004)
, pp. 135-144
-
-
Goodson, G.R.1
Wylie, J.J.2
Ganger, G.R.3
Reiter, M.K.4
-
14
-
-
85028775022
-
Secret sharing made short
-
Advances in Cryptology: CRYPTO '93, Springer
-
H. Krawczyk, "Secret sharing made short," in Advances in Cryptology: CRYPTO '93, vol. 773 of Lecture Notes in Computer Science, pp. 136-146, Springer, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 136-146
-
-
Krawczyk, H.1
-
15
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine generals problem," ACM Transactions on Programming Languages and Systems, vol. 4, pp. 382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
16
-
-
0033719035
-
An architecture for survivable coordination in large distributed systems
-
D. Malkhi and M. K. Reiter, "An architecture for survivable coordination in large distributed systems," IEEE Transactions on Knowledge and Data Engineering, vol. 12, no. 2, pp. 187-202, 2000.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.2
, pp. 187-202
-
-
Malkhi, D.1
Reiter, M.K.2
-
17
-
-
12344279229
-
CODEX: A robust and secure secret distribution system
-
M. A. Marsh and F. B. Schneider, "CODEX: A robust and secure secret distribution system," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 3447, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 3447
-
-
Marsh, M.A.1
Schneider, F.B.2
-
18
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Advances in Cryptology: CRYPTO' 91, Springer
-
T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology: CRYPTO' 91, vol. 576 of Lecture Notes in Computer Science, pp. 129-140, Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
19
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM, vol. 36, no. 2, pp. 335-348, 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
20
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
V. Shoup and R. Gennaro, "Securing threshold cryptosystems against chosen ciphertext attack," Journal of Cryptology, vol. 15, no. 2, pp. 75-96, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
|