-
2
-
-
0013001552
-
Proactive security: Long-term protection against break-ins
-
R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive security: Long-term protection against break-ins. RSA CryptoBytes, 3(1):1-8, 1997.
-
(1997)
RSA CryptoBytes
, vol.3
, Issue.1
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
3
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation (OSDI), 2002.
-
(2002)
Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation (OSDI)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
5
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In Usenix Security, 2003.
-
(2003)
Usenix Security
-
-
Crosby, S.1
Wallach, D.2
-
9
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. of the 38th IEEE Symp. on Foundations of Computer Science (FOCS), pages 384-393, 1997.
-
(1997)
Proc. of the 38th IEEE Symp. on Foundations of Computer Science (FOCS)
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
10
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In Proc. of the ACM Conference on Computer and Communications Security (CCS), pages 100-110, 1997.
-
(1997)
Proc. of the ACM Conference on Computer and Communications Security (CCS)
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
11
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In CRYPTO '95, pages 339-352, 1995.
-
(1995)
CRYPTO '95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
12
-
-
0020780905
-
The weak Byzantine generals problem
-
L. Lamport. The weak Byzantine generals problem. Journal of the ACM, 30(3):669-676, 1983.
-
(1983)
Journal of the ACM
, vol.30
, Issue.3
, pp. 669-676
-
-
Lamport, L.1
-
13
-
-
0002708070
-
Distributed computing
-
Chapter Also, to be published as Technical Memo MIT/LCS/TM-384, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA
-
L. Lamport and N. Lynch. Distributed computing. Chapter of Handbook on Theoretical Computer Science. Also, to be published as Technical Memo MIT/LCS/TM-384, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA, 1989.
-
(1989)
Handbook on Theoretical Computer Science
-
-
Lamport, L.1
Lynch, N.2
-
17
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for Internet applications
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. of the ACM SIGCOMM '01, 2001.
-
(2001)
Proc. of the ACM SIGCOMM '01
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
18
-
-
0003858844
-
-
Technical report, University of California at Berkeley, Computer Science Department
-
B.Y. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical report, University of California at Berkeley, Computer Science Department, 2001.
-
(2001)
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
-
-
Zhao, B.Y.1
Kubiatowicz, J.2
Joseph, A.3
|