-
1
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. 20th ACM STOC, 1-10, 1988.
-
(1988)
20th ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
84888077711
-
Perfectly secure message transmission revisited
-
Springer-Verlag
-
Y. Desmedt and Y. Wang. Perfectly secure message transmission revisited. EUROCRYPT '02, volume 2332 of LNCS, 502-517. Springer-Verlag, 2002.
-
(2002)
EUROCRYPT '02, Volume 2332 of LNCS
, vol.2332
, pp. 502-517
-
-
Desmedt, Y.1
Wang, Y.2
-
3
-
-
0027341860
-
Perfectly secure message transmission
-
January
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. JACM, 40(l):17-47, January 1993.
-
(1993)
JACM
, vol.40
, Issue.50
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
4
-
-
0000927535
-
Paths, trees and flowers
-
J. Edmonds. Paths, trees and flowers. Canadian Jl. of Math., 17:449-467, 1965.
-
(1965)
Canadian Jl. of Math.
, vol.17
, pp. 449-467
-
-
Edmonds, J.1
-
5
-
-
0003640244
-
Secure communication in minimal connectivity models
-
M. Franklin and R.N. Wright. Secure communication in minimal connectivity models. Journal of Cryptology, 13(1):9-30, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 9-30
-
-
Franklin, M.1
Wright, R.N.2
-
8
-
-
0002439168
-
Zur allgemeinen kurventheorie
-
K. Menger. Zur allgemeinen kurventheorie. Fundamenta Mathematicae, 10:96-115, 1927.
-
(1927)
Fundamenta Mathematicae
, vol.10
, pp. 96-115
-
-
Menger, K.1
-
9
-
-
85064850083
-
An O algorithm for maximum matching in general graphs
-
S. Micali and V. Vazirani. An O algorithm for maximum matching in general graphs. 21st IEEE FOCS, 17-27, 1980.
-
(1980)
21st IEEE FOCS
, pp. 17-27
-
-
Micali, S.1
Vazirani, V.2
-
10
-
-
85027164480
-
How to withstand mobile virus attacks
-
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. 10th ACM PODC, 51-61, 1991.
-
(1991)
10th ACM PODC
, pp. 51-61
-
-
Ostrovsky, R.1
Yung, M.2
-
11
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M.O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. JACM, 36:335-348, 1989.
-
(1989)
JACM
, vol.36
, pp. 335-348
-
-
Rabin, M.O.1
-
12
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
May
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. 21st ACM STOC, 73-85, May 1989.
-
(1989)
21st ACM STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
13
-
-
0012527611
-
Efficient perfectly secure message transmission in synchronous networks
-
H. Sayeed and H. Abu-Amara. Efficient perfectly secure message transmission in synchronous networks. Information and Computation, 126(1):53-61, 1996.
-
(1996)
Information and Computation
, vol.126
, Issue.1
, pp. 53-61
-
-
Sayeed, H.1
Abu-Amara, H.2
-
14
-
-
1142281014
-
Brief announcement: Efficient perfectly secure communication over synchronous networks
-
K. Srinathan, V. Vinod, and C. Pandu Rangan. Brief announcement: Efficient perfectly secure communication over synchronous networks. 22nd ACM PODC, page 252, 2003.
-
(2003)
22nd ACM PODC
, pp. 252
-
-
Srinathan, K.1
Vinod, V.2
Pandu Rangan, C.3
-
15
-
-
0020312165
-
Protocols for secure computations
-
A. C. Yao. Protocols for secure computations. 23rd IEEE FOCS, 160-164, 1982.
-
(1982)
23rd IEEE FOCS
, pp. 160-164
-
-
Yao, A.C.1
|