-
1
-
-
0032058159
-
The totem multiple-ring ordering and topology maintenance protocol
-
May
-
D. Agarwal, L. E. Moser, P. M. Melliar-Smith, and R. K. Budhia. The totem multiple-ring ordering and topology maintenance protocol. ACM Transactions on Computer Systems, 16(2):93-132, May 1998.
-
(1998)
ACM Transactions on Computer Systems
, vol.16
, Issue.2
, pp. 93-132
-
-
Agarwal, D.1
Moser, L.E.2
Melliar-Smith, P.M.3
Budhia, R.K.4
-
6
-
-
84947926543
-
Robust threshold DSS signatures
-
U. Maurer, editor, number 1070 in LNCS, IACR
-
R. Gennaro, S.Jarecki, H.Krawczyk, and T.Rabin. Robust Threshold DSS Signatures. In U. Maurer, editor, EUROCRYPT '96, number 1070 in LNCS, pages 354-371. IACR, 1996.
-
(1996)
EUROCRYPT '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
2642587068
-
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications
-
Trinity College Dublin
-
E. Gray, P. O'Connell, C. D. Jensen, S. Weber, J. M. Seigneur, and Y. Chen. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications. Technical Report TCD-CS-2002-66, Trinity College Dublin, 2002.
-
(2002)
Technical Report
, vol.TCD-CS-2002-66
-
-
Gray, E.1
O'Connell, P.2
Jensen, C.D.3
Weber, S.4
Seigneur, J.M.5
Chen, Y.6
-
9
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
IETF, Apr.
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, IETF, Apr. 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
12
-
-
0345755816
-
Adaptive security for multi-level ad-hoc networks
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu. Adaptive Security for Multi-level Ad-hoc Networks. In Journal of Wireless Communications and Mobile Computing (WCMC), volume 2, pages 533-547, 2002.
-
(2002)
Journal of Wireless Communications and Mobile Computing (WCMC)
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
13
-
-
0012845612
-
Providing robust and ubiquitous security support for MANET
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for MANET. In IEEE 9th International Conference on Network Protocols (ICNP), 2001.
-
(2001)
IEEE 9th International Conference on Network Protocols (ICNP)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
14
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-securing Ad Hoc Wireless Networks. In Seventh IEEE Symposium on Computers and Communications (ISCC '02), 2002.
-
(2002)
Seventh IEEE Symposium on Computers and Communications (ISCC '02)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
15
-
-
85084161955
-
Antigone: A flexible framework for secure group communication
-
USENIX, Aug.
-
P. McDaniel, A. Prakash, and P. Honeyman. Antigone: A flexible framework for secure group communication. In 8th USENIX Security Symposium, pages 99-114. USENIX, Aug. 1999.
-
(1999)
8th USENIX Security Symposium
, pp. 99-114
-
-
McDaniel, P.1
Prakash, A.2
Honeyman, P.3
-
18
-
-
0011828723
-
Receipt-free electronic voting schemes for large scale elections
-
T. Okamoto. Receipt-free electronic voting schemes for large scale elections. In Security Protocols Workshop, pages 25-35, 1997.
-
(1997)
Security Protocols Workshop
, pp. 25-35
-
-
Okamoto, T.1
-
19
-
-
84862417699
-
-
OpenSSL Project, http://www.openssl.org/.
-
-
-
-
20
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
D. Davies, editor, number 547 in LNCS, IACR
-
T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. Davies, editor, EUROCRYPT '91, number 547 in LNCS, pages 552-526. IACR, 1991.
-
(1991)
EUROCRYPT '91
, pp. 552-1526
-
-
Pedersen, T.P.1
-
21
-
-
84862417700
-
-
Peer Group Admission Control Project, http://sconce.ics.uci.edu/gac.
-
-
-
-
24
-
-
0034775826
-
A scalable content-addressable network
-
August
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM '01, pages 161-172, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM '01
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
25
-
-
0030130161
-
Horus: A flexible group communication system
-
April
-
R. V. Renesse, K. Birman, and S. Maffeis. Horus: A flexible group communication system. Communications of the ACM, 39(4):76-83, April 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4
, pp. 76-83
-
-
Renesse, R.V.1
Birman, K.2
Maffeis, S.3
-
27
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
28
-
-
84862421125
-
-
Secure Spread Project, http://www.cnds.jhu.edu/research/group/ secure_spread/.
-
-
-
-
29
-
-
84862421124
-
-
Spread Project, http://www.spread.org/.
-
-
-
-
30
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
August
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM '01, pages 149-160, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM '01
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
32
-
-
0003858844
-
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
-
UC Berkeley, April
-
B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, UC Berkeley, April 2001.
-
(2001)
Technical Report
, vol.UCB-CSD-01-1141
-
-
Zhao, B.Y.1
Kubiatowicz, J.2
Joseph, A.D.3
|