-
1
-
-
84941158326
-
-
April
-
Trustedpals source code. Downloadable from http://pil.informatik.uni- mannlieim.de, April 2006.
-
(2006)
Trustedpals Source Code
-
-
-
2
-
-
84941161462
-
-
ActiveMQ. http://activemq.codehaus.org.
-
-
-
-
3
-
-
24944549114
-
Gracefully degrading fair exchange with security modules
-
Springer-Verlag, April
-
Gildas Avoine, Felix Gärtner, Rachid Guerraoui, and Marko Vukolic. Gracefully degrading fair exchange with security modules. In Proceedings of the Fifth European Dependable Computing Conference, pages 55-71. Springer-Verlag, April 2005.
-
(2005)
Proceedings of the Fifth European Dependable Computing Conference
, pp. 55-71
-
-
Avoine, G.1
Gärtner, F.2
Guerraoui, R.3
Vukolic, M.4
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Chicago, IL USA, May. ACM Press
-
Michael Ben-Or, Shafi Goldwasser, and Ari Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual Symposium on Theory of Computing (STOC), pages 1-10, Chicago, IL USA, May 1988. ACM Press.
-
(1988)
Proceedings of the 20th Annual Symposium on Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
33750250958
-
Secure multi-party computation with security modules
-
RWTH Aachen, December
-
Zinaida Benenson, Felix C. Gärtner, and Dogan Kesdogan. Secure multi-party computation with security modules. Technical Report AIB-10-2004, RWTH Aachen, December 2004.
-
(2004)
Technical Report
, vol.AIB-10-2004
-
-
Benenson, Z.1
Gärtner, F.C.2
Kesdogan, D.3
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Richard Cole, editor, Chicago, IL, May. ACM Press
-
David Chaum, Claude Crepeau, and Ivan Damgård. Multiparty unconditionally secure protocols. In Richard Cole, editor, Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, pages 11-19, Chicago, IL, May 1988. ACM Press.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
9
-
-
33750233534
-
Revisiting failure detection and consensus in omission failure environments
-
Hanoi, Vietnam, October
-
Carole Delporte-Gallet, Hugues Fauconnier, and Felix C. Freiling. Revisiting failure detection and consensus in omission failure environments. In Proceedings of the International Colloquium on Theoretical Aspects of Computing (ICTAC05), Hanoi, Vietnam, October 2005.
-
(2005)
Proceedings of the International Colloquium on Theoretical Aspects of Computing (ICTAC05)
-
-
Delporte-Gallet, C.1
Fauconnier, H.2
Freiling, F.C.3
-
10
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
Joan G. Dyer, Mark Lindemann, Ronald Ferez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve Weingart. Building the IBM 4758 secure coprocessor. IEEE Computer, 34(10):57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Ferez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
16
-
-
0004251281
-
-
Springer
-
U. Hansmann, M. Nicklous, T. Schäck, A. Schneider, and F. Seliger. Smart Card Application Development Using Java - 2nd Edition. Springer, 2002.
-
(2002)
Smart Card Application Development Using Java - 2nd Edition
-
-
Hansmann, U.1
Nicklous, M.2
Schäck, T.3
Schneider, A.4
Seliger, F.5
-
18
-
-
33750228085
-
More efficient secure function evaluation using tiny trusted third parties
-
Dartmouth College, Computer Science, Hanover, NH, July
-
Alexander Iliev and Sean Smith. More efficient secure function evaluation using tiny trusted third parties. Technical Report TR2005-551, Dartmouth College, Computer Science, Hanover, NH, July 2005.
-
(2005)
Technical Report
, vol.TR2005-551
-
-
Iliev, A.1
Smith, S.2
-
19
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
24
-
-
84976810569
-
Reaching agreements in the presence of faults
-
April
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreements in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
25
-
-
0022689370
-
Distributed agreement in the presence of processor and communication faults
-
March
-
Kenneth J. Perry and Sam Toueg. Distributed agreement in the presence of processor and communication faults. IEEE Transactions on Software Engineering, 12(3):477-482, March 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.3
, pp. 477-482
-
-
Perry, K.J.1
Toueg, S.2
-
26
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
H. Federrath, editor, number 2009 in Lecture Notes in Computer Science
-
Andreas Pfitzmann and Marit Köhntopp. Anonymity, unobservability, and pseudonymity - A proposal for terminology. In H. Federrath, editor, Anonymity 2000, number 2009 in Lecture Notes in Computer Science, pages 1-9, 2001.
-
(2001)
Anonymity 2000
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
27
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
December
-
Fred B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299-319, December 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
28
-
-
24944506541
-
-
Trusted Computing Group. Trusted computing group homepage. Internet: https://www.trustedcomputinggroup.org/, 2003.
-
(2003)
Trusted Computing Group Homepage
-
-
-
29
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
Los Alamitos, Ca., USA, November. IEEE Computer Society Press
-
A. C. Yao. Protocols for secure computations (extended abstract). In 23th Annual Symposium on Foundations of Computer Science (FOCS '82), pages 160-164, Los Alamitos, Ca., USA, November 1982. IEEE Computer Society Press.
-
(1982)
23th Annual Symposium on Foundations of Computer Science (FOCS '82)
, pp. 160-164
-
-
Yao, A.C.1
-
30
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
November
-
Lidong Zhou, Fred B. Schneider, and Robbert van Renesse. COCA: A secure distributed on-line certification authority. TOCS, 20(4):329-368, November 2002.
-
(2002)
TOCS
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|