-
1
-
-
84937436045
-
Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques
-
Proc. Asiacrypt 2000, Springer-Verlag
-
M. Abdalla and M. Bellare, "Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques," in Proc. Asiacrypt 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 546-559, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 546-559
-
-
Abdalla, M.1
Bellare, M.2
-
2
-
-
84937427768
-
A new forward-secure digital signature scheme
-
Proc. Asiacrypt 2000, Springer-Verlag
-
M. Abdalla and L. Reyzin, "A new forward-secure digital signature scheme," in Proc. Asiacrypt 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 116-129, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 116-129
-
-
Abdalla, M.1
Reyzin, L.2
-
3
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
Usenix
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer, "FARSITE: Federated, available, and reliable storage for an incompletely trusted environment," in Proc. 5th Symposium on Operating System Design and Implementation (OSDI), Usenix, 2002.
-
(2002)
Proc. 5th Symposium on Operating System Design and Implementation (OSDI)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
4
-
-
24144439329
-
Two remarks on public-key cryptology
-
University of Cambridge
-
R. Anderson, "Two remarks on public-key cryptology," Technical Report UCAM-CL-TR-549, University of Cambridge, 2002.
-
(2002)
Technical Report
, vol.UCAM-CL-TR-549
-
-
Anderson, R.1
-
6
-
-
33750253019
-
Secure key-updating for lazy revocation
-
IBM Research, Aug.
-
M. Backes, C. Cachin, and A. Oprea, "Secure key-updating for lazy revocation," Research Report RZ 3627, IBM Research, Aug. 2005.
-
(2005)
Research Report
, vol.RZ 3627
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
8
-
-
79958074367
-
A forward-secure digital signature scheme
-
Proc. Crypto 1999, Springer-Verlag
-
M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Proc. Crypto 1999, vol. 1666 of Lecture Notes in Computer Science, pp. 431-448, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
9
-
-
35248891000
-
Forward-security in private-key cryptography
-
Proc. CT-RSA 2003, Springer-Verlag
-
M. Bellare and B. Yee, "Forward-security in private-key cryptography," in Proc. CT-RSA 2003, vol. 2612 of Lecture Notes in Computer Science, pp. 1-18, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
, pp. 1-18
-
-
Bellare, M.1
Yee, B.2
-
11
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Proc. Eurocrypt 2003, Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Proc. Eurocrypt 2003, vol. 2656 of Lecture Notes in Computer Science, pp. 255-271, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for Unix
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, and P. Persiano, "The design and implementation of a transparent cryptographic file system for Unix," in Proc. USENIX Annual Technical Conference 2001, Freenix Track, pp. 199-212, 2001.
-
(2001)
Proc. USENIX Annual Technical Conference 2001, Freenix Track
, pp. 199-212
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
13
-
-
35248884707
-
Intrusion-resilient public-key encryption
-
Proc. CT-RSA 2003, Springer-Verlag
-
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-resilient public-key encryption," in Proc. CT-RSA 2003, vol. 2612 of Lecture Notes in Computer Science, pp. 19-32, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
, pp. 19-32
-
-
Dodis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
14
-
-
84947254092
-
Key insulated public-key cryptosystems
-
Proc. Eurocrypt 2002, Springer-Verlag
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key insulated public-key cryptosystems," in Proc. Eurocrypt 2002, vol. 2332 of Lecture Notes in Computer Science, pp. 65-82, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
15
-
-
35248813300
-
Strong key-insulated signature schemes
-
Proc. Workshop of Public Key Cryptography (PKC), Springer-Verlag
-
Y. Dodis, J. Katz, and M. Yung, "Strong key-insulated signature schemes," in Proc. Workshop of Public Key Cryptography (PKC), vol. 2567 of Lecture Notes in Computer Science, pp. 130-144, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Yung, M.3
-
18
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing remote untrusted storage," in Proc. Network and Distributed Systems Security Symposium (NDSS 2003), pp. 131-145, 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium (NDSS 2003)
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
19
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
Proc. Crypto 2004, Springer-Verlag
-
M. T. Goodrich, J. Z. Sun, and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices," in Proc. Crypto 2004, vol. 3152 of Lecture Notes in Computer Science, pp. 511-522, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 511-522
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
22
-
-
84880879872
-
Forward-secure signatures with optimal signing and verifying
-
Proc. Crypto 2001, Springer-Verlag
-
G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying," in Proc. Crypto 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 332-354, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 332-354
-
-
Itkis, G.1
Reyzin, L.2
-
23
-
-
84937422774
-
SiBIR: Signer-base intrusion-resilient signatures
-
Proc. Crypto 2002, Springer-Verlag
-
G. Itkis and L. Reyzin, "SiBIR: Signer-base intrusion-resilient signatures," in Proc. Crypto 2002, vol. 2442 of Lecture Notes in Computer Science, pp. 499-514, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
24
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. 2nd USENIX Conference on File and Storage Technologies (FAST), 2003.
-
(2003)
Proc. 2nd USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
26
-
-
0034440650
-
Oceanstore: An architecture for global-scale persistent storage
-
ACM
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, "Oceanstore: An architecture for global-scale persistent storage," in Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, ACM, 2000.
-
(2000)
Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
27
-
-
84947234528
-
Efficient generic forward-secure signatures with an unbounded number of time periods
-
Proc. Eurocrypt 2002, Springer-Verlag
-
T. Malkin, D. Micciancio, and S. Miner, "Efficient generic forward-secure signatures with an unbounded number of time periods," in Proc. Eurocrypt 2002, vol. 2332 of Lecture Notes in Computer Science, pp. 400-417, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 400-417
-
-
Malkin, T.1
Micciancio, D.2
Miner, S.3
-
28
-
-
35048851224
-
The hierarchy of key evolving signatures and a characterization of proxy signatures
-
Proc. Eurocrypt 2004, Springer-Verlag
-
T. Malkin, S. Obana, and M. Yung, "The hierarchy of key evolving signatures and a characterization of proxy signatures," in Proc. Eurocrypt 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 306-322, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 306-322
-
-
Malkin, T.1
Obana, S.2
Yung, M.3
-
29
-
-
4644274612
-
Strong security for distributed file systems
-
E. Miller, D. Long, W. Freeman, and B. Reed, "Strong security for distributed file systems," in Proc. the First USENIX Conference on File and Storage Technologies (FAST), 2002.
-
(2002)
Proc. the First USENIX Conference on File and Storage Technologies (FAST)
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
30
-
-
0038657277
-
Using AVL trees for fault tolerant group key management
-
O. Rodeh, K. Birman, and D. Dolev, "Using AVL trees for fault tolerant group key management," International Journal on Information Security, vol. 1, no. 2, pp. 84-99, 2001.
-
(2001)
International Journal on Information Security
, vol.1
, Issue.2
, pp. 84-99
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
31
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
33
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|