-
5
-
-
0036949138
-
Algorithms for fault-tolerant routing in circuit-switched networks
-
A. Bagchi, A. Chaudhary, P. Kolman, and C. Scheideler. Algorithms for fault-tolerant routing in circuit-switched networks. In Proc. 14th ACM Symp. on Parallel Algorithms and Architectures, pages 265-274, 2002.
-
(2002)
Proc. 14th ACM Symp. on Parallel Algorithms and Architectures
, pp. 265-274
-
-
Bagchi, A.1
Chaudhary, A.2
Kolman, P.3
Scheideler, C.4
-
7
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
R. Blom. An optimal class of symmetric key generation systems. In Proc. of EUROCRYPT '84, pages 335-338, 1984.
-
(1984)
Proc. of EUROCRYPT '84
, pp. 335-338
-
-
Blom, R.1
-
8
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In CRYPTO'92, pages 471-486, 1992.
-
(1992)
CRYPTO'92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
9
-
-
84874324906
-
Identity-based encryption from weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from weil pairing. In Proc. of CRYPTO 2001, pages 213-229, 2001.
-
(2001)
Proc. of CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0004941866
-
-
Technical Report ORO Technical Report 15, Operational Research Office, Johns Hopkins University, Baltimore, MD
-
R.G. Busaker and P.J. Gowen. A procedure for determining minimal-cost flows by doubling scaling. Technical Report ORO Technical Report 15, Operational Research Office, Johns Hopkins University, Baltimore, MD, 1961.
-
(1961)
A Procedure for Determining Minimal-cost Flows by Doubling Scaling
-
-
Busaker, R.G.1
Gowen, P.J.2
-
13
-
-
84945708671
-
Algorithm 360: Shortest path forest with topological ordering
-
R. Dial. Algorithm 360: Shortest path forest with topological ordering. Comm. ACM, pages 632-633, 1969.
-
(1969)
Comm. ACM
, pp. 632-633
-
-
Dial, R.1
-
14
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. JACM, 40(1):17-47, 1993.
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
15
-
-
0015330635
-
Theoretical improvements in algorithmic efficiency for network low problems
-
J. Edmonds and R.M. Karp. Theoretical improvements in algorithmic efficiency for network low problems. J. ACM, 19:248-264, 1972.
-
(1972)
J. ACM
, vol.19
, pp. 248-264
-
-
Edmonds, J.1
Karp, R.M.2
-
16
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of CRYPTO'86, pages 186-194, 1986.
-
(1986)
Proc. of CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
84957653101
-
Secure communication in minimal connectivity models
-
M. Franklin and R. Wright. Secure communication in minimal connectivity models. In Proc. of EUROCRYPT'98, pages 346-360, 1998.
-
(1998)
Proc. of EUROCRYPT'98
, pp. 346-360
-
-
Franklin, M.1
Wright, R.2
-
19
-
-
0027617271
-
Increasing availability and security of an authentication service
-
L. Gong. Increasing availability and security of an authentication service. IEEE J. Selected Areas in Communications, 11(5):657-662, 1993.
-
(1993)
IEEE J. Selected Areas in Communications
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
21
-
-
0003601787
-
-
Technical Report Interim Technical Report 8, Operation Research Center, MIT, Cambridge, MA
-
W.S. Jewell. Optimal flow through networks. Technical Report Interim Technical Report 8, Operation Research Center, MIT, Cambridge, MA, 1958.
-
(1958)
Optimal Flow Through Networks
-
-
Jewell, W.S.1
-
22
-
-
0003421296
-
-
PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
J. Kleinberg. Approximation Algorithms for Disjoint Paths Problems. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1996.
-
(1996)
Approximation Algorithms for Disjoint Paths Problems
-
-
Kleinberg, J.1
-
25
-
-
0036957420
-
On perfectly secure communication over arbitrary networks
-
M. Kumar, P. Goundan, K. Srinathan, and C. Pandu Rangan. On perfectly secure communication over arbitrary networks. In Proc. of 21st Annual ACM Symposium on the Principles of Distributed Computing, pages 193-202, 2002.
-
(2002)
Proc. of 21st Annual ACM Symposium on the Principles of Distributed Computing
, pp. 193-202
-
-
Kumar, M.1
Goundan, P.2
Srinathan, K.3
Rangan, C.P.4
-
26
-
-
0005986692
-
Secret-key agreement without public-key cryptography
-
T. Leighton and S. Micali. Secret-key agreement without public-key cryptography (extended abstract). In Proc. of CRYPTO '93, pages 456-479, 1993.
-
(1993)
Proc. of CRYPTO '93
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
27
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. McEliece and D. Sarwate. On sharing secrets and Reed-Solomon codes. Comm. ACM, 24(9):583-584, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.1
Sarwate, D.2
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. ACM, 22(11): 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of CRYPTO '84, pages 47-53, 1984.
-
(1984)
Proc. of CRYPTO '84
, pp. 47-53
-
-
Shamir, A.1
-
32
-
-
0015202957
-
On some techniques useful for solution of transportation network problems
-
N. Tomizava. On some techniques useful for solution of transportation network problems. Networka, 1:173-194, 1972.
-
(1972)
Networka
, vol.1
, pp. 173-194
-
-
Tomizava, N.1
|