-
2
-
-
0032058159
-
Totem multiple-ring ordering & topology maintenance protocol
-
May
-
D. Agarwal, L. Moser, P. Melliar-Smith, and R. Budhia. Totem multiple-ring ordering & topology maintenance protocol. ACM ToCS, 16(2):93-132, May 1998.
-
(1998)
ACM ToCS
, vol.16
, Issue.2
, pp. 93-132
-
-
Agarwal, D.1
Moser, L.2
Melliar-Smith, P.3
Budhia, R.4
-
3
-
-
85029688731
-
Transis: A communication sub-system for high availability
-
Y. Amir, D. Dolev, S. Kramer, and D. Malki. Transis: A communication sub-system for high availability. IEEE FTCS'92, pages 76-84, 1992.
-
(1992)
IEEE FTCS'92
, pp. 76-84
-
-
Amir, Y.1
Dolev, D.2
Kramer, S.3
Malki, D.4
-
4
-
-
0035001320
-
Exploring robustness in group key agreement
-
April
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, and G. Tsudik. Exploring robustness in group key agreement. In IEEE ICDCS, pages 399-408, April 2001.
-
(2001)
IEEE ICDCS
, pp. 399-408
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.4
Stanton, J.5
Tsudik, G.6
-
5
-
-
0001451923
-
Some Open Issues and New Directions in Group Signatures
-
G. Ateniese and G. Tsudik. Some Open Issues and New Directions in Group Signatures. In Financial Cryptography, 1999.
-
(1999)
Financial Cryptography
-
-
Ateniese, G.1
Tsudik, G.2
-
7
-
-
84957354154
-
Efficient and generalized group signatures
-
May
-
J. Camenisch. Efficient and generalized group signatures. In EUROCRYPT'97, pages 465-479, May 1997.
-
(1997)
EUROCRYPT'97
, pp. 465-479
-
-
Camenisch, J.1
-
8
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
R. Canetti and A. Herzberg. Maintaining security in the presence of transient faults. In CRYPTO'94, pages 425-438.
-
CRYPTO'94
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
14
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In FOCS'97, pages 384-393. 1997.
-
(1997)
FOCS'97
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.3
Yung, M.4
-
16
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
May
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In EUROCRYPT'00, pages 539-556, May 2000.
-
(2000)
EUROCRYPT'00
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
17
-
-
84942148199
-
-
IETF Multicast Security Working Group, See: http://www.securemulticast.org/msec-index.htm.
-
-
-
-
18
-
-
84942148200
-
-
IRTF Group Security Research Group, See: http://www.securemulticast.org/gsec-index.htm.
-
-
-
-
19
-
-
84957649548
-
Identity escrow
-
J. Kilian and E. Petrank. Identity escrow. In CRYPTO'98, pages 169-185. 1998.
-
(1998)
CRYPTO'98
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
20
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
November
-
Y. Kim, A. Perring, and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In ACM CCS, pages 235-244, November 2000.
-
(2000)
ACM CCS
, pp. 235-244
-
-
Kim, Y.1
Perring, A.2
Tsudik, G.3
-
21
-
-
4143108145
-
Providing robust and ubiquitous security support for MANET
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for MANET. In IEEE ICNP'01, 2001.
-
(2001)
IEEE ICNP'01
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
23
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, Sept. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, C.1
Ts'o, T.2
-
24
-
-
0035747565
-
Accountable-subgroup multisignatures
-
November
-
K. Ohta, S. Micali, and L. Reyzin. Accountable-subgroup multisignatures. In ACM CCS, pages 245-254, November 2001.
-
(2001)
ACM CCS
, pp. 245-254
-
-
Ohta, K.1
Micali, S.2
Reyzin, L.3
-
25
-
-
0011828723
-
Receipt-free electronic voting schemes for large scale elections
-
T. Okamoto. Receipt-free electronic voting schemes for large scale elections. In Security Protocols Workshop, pages 25-35, 1997.
-
(1997)
Security Protocols Workshop
, pp. 25-35
-
-
Okamoto, T.1
-
26
-
-
0030130161
-
Horus: A flexible group communication system
-
April
-
R. V. Renesse, K. Birman, and S. Maffeis. Horus: A flexible group communication system. CACM, 39(4):76-83, April 1996.
-
(1996)
CACM
, vol.39
, Issue.4
, pp. 76-83
-
-
Renesse, R.V.1
Birman, K.2
Maffeis, S.3
-
28
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
29
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir. How to share a secret. CACM, 22(11):612-613, Nov. 1979.
-
(1979)
CACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
0035750987
-
Practical forward secure group signature schemes
-
Nov
-
D. Song. Practical forward secure group signature schemes. In ACM CCS, Nov 2001.
-
(2001)
ACM CCS
-
-
Song, D.1
-
33
-
-
84942148202
-
-
The Peer-to-Peer Working Group, See: http://www.peer-to-peerwg.org/.
-
-
-
|