-
2
-
-
84946849674
-
The Reality of Collaboratories
-
coverdate May
-
D. A. Agarwal, S. R. Sachs, and W. E. Johnston. The Reality of Collaboratories. Computer Physics Communications, 10(issue 1-3):pages 270–299, coverdate May 1998.
-
(1998)
Computer Physics Communications
, vol.10
, Issue.1-3
, pp. 270-299
-
-
Agarwal, D.A.1
Sachs, S.R.2
Johnston, W.E.3
-
5
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
B. Preneel, editor, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In B. Preneel, editor, Proc. of Eurocrypt’00, volume 1807 of Lecture Notes in Computer Science, pages 139–155. Springer-Verlag, 2000.
-
(2000)
Proc. Of Eurocrypt’00, Volume 1807 Of Lecture Notes in Computer Science
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
7
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In Proc of ACM CCS’93. ACM Press, 1993.
-
(1993)
Proc of ACM CCS’93
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84947906522
-
The Exact Security of Digital Signatures: How to sign with RSA and Rabin
-
U. Maurer, editor, Springer-Verlag
-
M. Bellare and P. Rogaway. The Exact Security of Digital Signatures: How to sign with RSA and Rabin. In U. Maurer, editor, Proc of Eurocrypt’96, Lecture Notes in Computer Science. Springer-Verlag, 1996.
-
(1996)
Proc of Eurocrypt’96, Lecture Notes in Computer Science.
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
84946840065
-
-
Technical report, December, Full version of this paper, available at
-
E. Bresson, O. Chevassut, and D. Pointcheval. Provably Group Diffie-Hellman Key Exchange – The Dynamic Case. Technical report, December 2001. Full version of this paper, available at http://www.di.ens.fr/∼pointche.
-
(2001)
Provably Group Diffie-Hellman Key Exchange – the Dynamic Case
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
A. De Santis, editor, Springer-Verlag
-
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In A. De Santis, editor, Proc of Eurocrypt’ 94, volume 950 of Lecture Notes in Computer Science, pages 275–286. Springer-Verlag, 1995.
-
(1995)
Proc of Eurocrypt’ 94, Volume 950 of Lecture Notes in Computer Science
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
13
-
-
0032661699
-
Issues in Multicast Security: A Taxonomy and Efficient Constructions
-
March
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Issues in Multicast Security: A Taxonomy and Efficient Constructions. In Proc. of INFOCOM’99, March 1999.
-
(1999)
Proc. Of INFOCOM’99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
16
-
-
0020180459
-
A Conference Key Distribution System
-
September
-
I. Ingemarsson, D. Tang, and C. Wong. A Conference Key Distribution System. In IEEE Transactions on Information Theory, volume 28(5), pages 714–720, September 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
21
-
-
0029451867
-
Vic: A Flexible Frameworkfor Packet Video
-
November
-
S. McCanne and V. Jacobson. vic: A Flexible Frameworkfor Packet Video. In ACM Multimedia’95, pages 511–522, November 1995.
-
(1995)
ACM Multimedia’95
, pp. 511-522
-
-
McCanne, S.1
Jacobson, V.2
-
22
-
-
0031675299
-
Consistent Object Replication in the Eternal System
-
L.E. Moser, P.M. Melliar-Smith, and P. Narasimhan. Consistent Object Replication in the Eternal System. Theory and Practice of Object Systems, 4(2):pages 81–92, 1998.
-
(1998)
Theory and Practice of Object Systems
, vol.4
, Issue.2
, pp. 81-92
-
-
Moser, L.E.1
Melliar-Smith, P.M.2
Narasimhan, P.3
-
23
-
-
0031332843
-
Number-Theoretic Constructions of Efficient Pseudo- Random Functions
-
M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo- Random Functions. In Proc. of 38th IEEE FOCS Symposium, pages 458–467, 1997.
-
(1997)
Proc. Of 38Th IEEE FOCS Symposium
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
26
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. J. of Cryptology, 13(3):361–396, 2000.
-
(2000)
J. Of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
84942550160
-
Lower Bounds for Discrete Logarithms and Related Problems
-
W. Fumy, editor, Springer-Verlag
-
V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In W. Fumy, editor, Proc. of Eurocrypt’97, volume 1233 of Lecture Notes in Computer Science, pages 256–266. Springer-Verlag, 1997.
-
(1997)
Proc. Of Eurocrypt’97, Volume 1233 Of Lecture Notes in Computer Science
, pp. 256-266
-
-
Shoup, V.1
-
28
-
-
84978523717
-
A Secure Audio Teleconference System
-
S. Goldwasser, editor, Springer-Verlag
-
D. Steer, L. Strawczynski, W. Diffie, and M. Wiener. A Secure Audio Teleconference System. In S. Goldwasser, editor, Proc. of Crypto’ 88, volume 403 of Lecture Notes in Computer Science, pages 520–528. Springer-Verlag, 1988.
-
(1988)
Proc. Of Crypto’ 88, Volume 403 Of Lecture Notes in Computer Science
, pp. 520-528
-
-
Steer, D.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
30
-
-
0010227328
-
Diffie-Hellman Key Distribution Extended to Groups
-
March
-
M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman Key Distribution Extended to Groups. In ACM CCS’96, March 1996.
-
(1996)
ACM CCS’96
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
31
-
-
84957807365
-
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol
-
Springer-Verlag
-
Wen-Guey Tzeng. A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol. In Proc. of PKC2000, Lecture Notes in Computer Science. Springer-Verlag, 2000.
-
(2000)
Proc. Of PKC2000, Lecture Notes in Computer Science
-
-
Tzeng, W.-G.1
|