-
1
-
-
3543079508
-
An analysis of Internet content delivery systems
-
Boston, MA, Oct.
-
S. Saroui, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy, "An analysis of Internet content delivery systems," in Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, Oct. 2002.
-
(2002)
Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Saroui, S.1
Gummadi, K.P.2
Dunn, R.J.3
Gribble, S.D.4
Levy, H.M.5
-
2
-
-
0030671783
-
Practical loss-resilient codes
-
El Paso, TX, May
-
M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V. Stemann, "Practical loss-resilient codes," in Proc. 29th Annual ACM Symposium on Theory of Computing (STOC), El Paso, TX, May 1997.
-
(1997)
Proc. 29th Annual ACM Symposium on Theory of Computing (STOC)
-
-
Luby, M.1
Mitzenmacher, M.2
Shokrollahi, A.3
Spielman, D.4
Stemann, V.5
-
4
-
-
3543057203
-
Online codes
-
Nov.
-
P. Maymounkov, "Online codes," NYU, Tech. Rep. 2002-833, Nov. 2002.
-
(2002)
NYU, Tech. Rep.
, vol.2002
, Issue.833
-
-
Maymounkov, P.1
-
6
-
-
0002484060
-
A digital fountain approach to reliable distribution of bulk data
-
Vancouver, Canada, Sept.
-
J. Byers, M. Luby, M. Mitzenmacher, and A. Rege, "A Digital Fountain approach to reliable distribution of bulk data," in Proc. ACM SIGCOMM '98, Vancouver, Canada, Sept. 1998.
-
(1998)
Proc. ACM SIGCOMM '98
-
-
Byers, J.1
Luby, M.2
Mitzenmacher, M.3
Rege, A.4
-
7
-
-
0032673944
-
Accessing multiple mirror sites in parallel: Using Tornado codes to speed up downloads
-
New York, NY, Mar.
-
J. Byers, M. Luby, and M. Mitzenmacher, "Accessing multiple mirror sites in parallel: Using Tornado codes to speed up downloads," in Proc. IEEE INFOCOM '99, New York, NY, Mar. 1999.
-
(1999)
Proc. IEEE INFOCOM '99
-
-
Byers, J.1
Luby, M.2
Mitzenmacher, M.3
-
8
-
-
0011116653
-
Informed content delivery across adaptive overlay networks
-
Aug.
-
J. Byers, J. Considine, M. Mitzenmacher, and S. Rost, "Informed content delivery across adaptive overlay networks," in Proc. ACM SIGCOMM '02, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM '02
-
-
Byers, J.1
Considine, J.2
Mitzenmacher, M.3
Rost, S.4
-
10
-
-
21644470909
-
Splitstream: High-bandwidth multicast in a cooperative environment
-
Bolton's Landing, NY, Oct.
-
M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh, "Splitstream: High-bandwidth multicast in a cooperative environment," in Proc. 18th ACM Symposium on Operating Systems Principles (SOSP), Bolton's Landing, NY, Oct. 2003.
-
(2003)
Proc. 18th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.-M.3
Nandi, A.4
Rowstron, A.5
Singh, A.6
-
11
-
-
21644448224
-
Bullet: High bandwidth data dissemination using an overlay mesh
-
Bolton's Landing, NY, Oct.
-
D. Kostić, A. Rodriguez, J. Albrecht, and A. Vahdat, "Bullet: High bandwidth data dissemination using an overlay mesh," in Proc. 18th ACM Symposium on Operating Systems Principles (SOSP), Bolton's Landing, NY, Oct. 2003.
-
(2003)
Proc. 18th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Kostić, D.1
Rodriguez, A.2
Albrecht, J.3
Vahdat, A.4
-
12
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
Apr.
-
L. Rizzo, "Effective erasure codes for reliable computer communication protocols," ACM Computer Communication Review, vol. 27, no. 2, Apr. 1997.
-
(1997)
ACM Computer Communication Review
, vol.27
, Issue.2
-
-
Rizzo, L.1
-
13
-
-
0003629991
-
-
FIPS 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr.
-
FIPS 180-1, Secure Hash Standard, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
14
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
San Diego, CA, Feb.
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. Tygar, "Distillation codes and applications to DoS resistant multicast authentication," in Proc. 11th Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, Feb. 2004.
-
(2004)
Proc. 11th Network and Distributed Systems Security Symposium (NDSS)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.5
-
15
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
Santa Barbara, CA, Aug.
-
R. C. Merkle, "A digital signature based on a conventional encryption function," in Advances in Cryptology - CRYPTO '87, Santa Barbara, CA, Aug. 1987.
-
(1987)
Advances in Cryptology - CRYPTO '87
-
-
Merkle, R.C.1
-
16
-
-
0003508562
-
-
Federal Information Processing Standards Publication 186-2, U.S. Dept. of Commerce/NIST
-
National Institute of Standards and Technology, "Digital Signature Standard (DSS)," Federal Information Processing Standards Publication 186-2, U.S. Dept. of Commerce/NIST, 2000.
-
(2000)
Digital Signature Standard (DSS)
-
-
-
17
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Santa Barbara, CA, Aug.
-
T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology - CRYPTO '91, Santa Barbara, CA, Aug. 1991.
-
(1991)
Advances in Cryptology - CRYPTO '91
-
-
Pedersen, T.P.1
-
18
-
-
0346528350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
Santa Barbara, CA, Aug.
-
D. Chaum, E. van Heijst, and B. Pfitzmann, "Cryptographically strong undeniable signatures, unconditionally secure for the signer," in Advances in Cryptology - CRYPTO '91, Santa Barbara, CA, Aug. 1991.
-
(1991)
Advances in Cryptology - CRYPTO '91
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
19
-
-
5744224341
-
Fast batch verification for modular exponentiation and digital signatures
-
Helsinki, Finland, May
-
M. Bellare, J. Garay, and T. Rabin, "Fast batch verification for modular exponentiation and digital signatures," in Advances in Cryptology - EUROCRYPT 98, Helsinki, Finland, May 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT 98
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
20
-
-
0003614758
-
Digitalized signatures and public key functions as intractable as factorization
-
Jan.
-
'M. O. Rabin, "Digitalized signatures and public key functions as intractable as factorization," MIT Laboratory for Computer Science, Tech. Rep. TR-212, Jan. 1979.
-
(1979)
MIT Laboratory for Computer Science, Tech. Rep.
, vol.TR-212
-
-
Rabin, M.O.1
-
21
-
-
0343751638
-
Incremental cryptography: The case of hashing and signing
-
Santa Barbara, CA, Aug.
-
M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing," in Advances in Cryptology CKYPTO '94, Santa Barbara, CA, Aug. 1994.
-
(1994)
Advances in Cryptology CKYPTO '94
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
22
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEE INFOCOM '99, New York, NY, 1999.
-
(1999)
Proc. IEEE INFOCOM '99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
29
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Trans. Inf. Syst. Secur., vol. 6, no. 2, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.2
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
31
-
-
0001989185
-
A new family of authentication protocols
-
Oct.
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham, "A new family of authentication protocols," Operating Systems Review, vol. 32, no. 4, Oct. 1998.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
32
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
Oakland, CA, May
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient authentication and signature of multicast streams over lossy channels," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
Proc. IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
33
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
San Diego, CA, Feb.
-
_, "Efficient and secure source authentication for multicast," in Proc. Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2001.
-
(2001)
Proc. Network and Distributed System Security Symposium (NDSS)
-
-
-
35
-
-
0002809150
-
One-way accumulators: A decentralized alternative to digital sinatures
-
Lofthus, Norway, May
-
J. Benaloh and M. de Mare, "One-way accumulators: A decentralized alternative to digital sinatures," in Advances in Cryptology EUROCRYPT 93, Lofthus, Norway, May 1993.
-
(1993)
Advances in Cryptology EUROCRYPT 93
-
-
Benaloh, J.1
De Mare, M.2
-
36
-
-
0001213205
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Konstanz, Germany, May
-
N. Barić and B. Pfitzmann, "Collision-free accumulators and fail-stop signature schemes without trees," in Advances in Cryptology EUROCRYPT 97, Konstanz, Germany, May 1997.
-
(1997)
Advances in Cryptology EUROCRYPT 97
-
-
Barić, N.1
Pfitzmann, B.2
-
37
-
-
0042917398
-
A new paradigm for collision-free hashing: Incrementality at reduced cost
-
Konstanz, Germany, May
-
M. Bellare and D. Micciancio, "A new paradigm for collision-free hashing: Incrementality at reduced cost," in Advances in Cryptology EUROCRYPT 97, Konstanz, Germany, May 1997.
-
(1997)
Advances in Cryptology EUROCRYPT 97
-
-
Bellare, M.1
Micciancio, D.2
-
38
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Santa Barbara, CA, Aug.
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Advances in Cryptology - CRYPTO 2002, Santa Barbara, CA, Aug. 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
39
-
-
24944499454
-
Accumulating composites and improved group signing
-
Taipei, Taiwan, Nov.
-
G. Tsudik and S. Xu, "Accumulating composites and improved group signing," in Advances in Cryptology - ASIACRYPT-2003, Taipei, Taiwan, Nov. 2003.
-
(2003)
Advances in Cryptology - ASIACRYPT-2003
-
-
Tsudik, G.1
Xu, S.2
-
42
-
-
23044531486
-
Homomorphic signature schemes
-
San Jose, CA, Feb.
-
R. Johnson, D. Molnar, D. Song, and D. Wagner, "Homomorphic signature schemes," in Progress in Cryptology - CT-RSA 2002, San Jose, CA, Feb. 2002.
-
(2002)
Progress in Cryptology - CT-RSA 2002
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
|