-
1
-
-
70349238245
-
-
allmydata.org web site, 2007.
-
allmydata.org web site, 2007.
-
-
-
-
2
-
-
70349244305
-
-
R. Anderson. 'trusted computing' frequently asked questions, 2003. [Online; accessed 26-May-2008].
-
R. Anderson. 'trusted computing' frequently asked questions, 2003. [Online; accessed 26-May-2008].
-
-
-
-
3
-
-
35248822352
-
-
J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In In Selected Areas in Cryptography, 2595 of LNCS, pages 62{75. Springer-Verlag, 2002.
-
J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In In Selected Areas in Cryptography, volume 2595 of LNCS, pages 62{75. Springer-Verlag, 2002.
-
-
-
-
4
-
-
70349244304
-
One-up problem for (ec)dsa. Cryptology ePrint Archive
-
Report 2008/286
-
D. R. L. Brown. One-up problem for (ec)dsa. Cryptology ePrint Archive, Report 2008/286, 2008.
-
(2008)
-
-
Brown, D.R.L.1
-
5
-
-
0032178374
-
A digital fountain approach to reliable distribution of bulk data
-
J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. A digital fountain approach to reliable distribution of bulk data. In SIGCOMM, pages 56{67, 1998.
-
(1998)
SIGCOMM, pages 56{67
-
-
Byers, J.W.1
Luby, M.2
Mitzenmacher, M.3
Rege, A.4
-
6
-
-
70349241171
-
Programming semantics for multiprogrammed computations
-
26(1):29{35
-
J. B. Dennis and E. C. V. Horn. Programming semantics for multiprogrammed computations. Commun. ACM, 26(1):29{35, 1983.
-
(1983)
Commun. ACM
-
-
Dennis, J.B.1
Horn, E.C.V.2
-
7
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
Washington, DC, USA, IEEE Computer Society
-
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS '02: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02), page 617, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ICDCS '02: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
, pp. 617
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
11
-
-
51849094729
-
On the (im)possibility of key dependent encryption. Cryptology ePrint Archive
-
Report 2008/164
-
I. Haitner and T. Holenstein. On the (im)possibility of key dependent encryption. Cryptology ePrint Archive, Report 2008/164, 2008.
-
(2008)
-
-
Haitner, I.1
Holenstein, T.2
-
14
-
-
74049103479
-
-
A. Juels and J. Burton S. Kaliski. Pors: proofs of retrievability for large files. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584{597, New York, NY, USA, 2007. ACM.
-
A. Juels and J. Burton S. Kaliski. Pors: proofs of retrievability for large files. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584{597, New York, NY, USA, 2007. ACM.
-
-
-
-
15
-
-
70349242721
-
-
J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In In Proc. 1997 Security Protocols Workshop, pages 91{104. Springer-Verlag, 1997.
-
J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In In Proc. 1997 Security Protocols Workshop, pages 91{104. Springer-Verlag, 1997.
-
-
-
-
17
-
-
36849013675
-
Beyond one-third faulty replicas in byzantine fault tolerant systems
-
USENIX
-
J. Li and D. Mazifieres. Beyond one-third faulty replicas in byzantine fault tolerant systems. In NSDI. USENIX, 2007.
-
(2007)
NSDI
-
-
Li, J.1
Mazifieres, D.2
-
18
-
-
0012988046
-
Comments to NIST concerning AES-modes of operations: CTR-mode encryption
-
Baltimore, Maryland, USA
-
H. Lipmaa, P. Rogaway, and D. Wagner. Comments to NIST concerning AES-modes of operations: CTR-mode encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, 2000.
-
(2000)
Symmetric Key Block Cipher Modes of Operation Workshop
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
19
-
-
84944878354
-
-
CRC Press, Inc, Boca Raton, FL, USA
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
20
-
-
84958802026
-
-
R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, pages 369{378, London, UK, 1988. Springer-Verlag.
-
R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, pages 369{378, London, UK, 1988. Springer-Verlag.
-
-
-
-
21
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May
-
M. S. Miller. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
-
(2006)
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
22
-
-
33646166700
-
Capability myths demolished
-
Technical report, Combex, Inc
-
M. S. Miller, K. P. Yee, and J. Shapiro. Capability myths demolished. Technical report, Combex, Inc., 2003.
-
(2003)
-
-
Miller, M.S.1
Yee, K.P.2
Shapiro, J.3
-
23
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
22:122{136
-
R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22:122{136, 1996.
-
(1996)
IEEE Transactions on Software Engineering
-
-
Needham, R.1
-
24
-
-
84936033986
-
The digital signature standard
-
NIST, 35(7):36{40
-
NIST. The digital signature standard. Commun. ACM, 35(7):36{40, 1992.
-
(1992)
Commun. ACM
-
-
-
26
-
-
51549120471
-
-
B. Preneel and P. C. V. Oorschot. Mdx-mac and building fast macs from hash functions. pages 1{14. Springer-Verlag, 1995.
-
B. Preneel and P. C. V. Oorschot. Mdx-mac and building fast macs from hash functions. pages 1{14. Springer-Verlag, 1995.
-
-
-
-
27
-
-
0043126255
-
A method for obtaining digital signatures and public-key cryptosystems
-
Technical Report MIT/LCS/TM-82, MIT, 1977
-
R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT, 1977.
-
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
28
-
-
70349255206
-
-
L. Rizzo. the feasibility of software fec. Technical Report LR-970131, DEIT, 1997.
-
L. Rizzo. the feasibility of software fec. Technical Report LR-970131, DEIT, 1997.
-
-
-
-
29
-
-
70349233411
-
-
Wikipedia. Hushmail | Wikipedia, the free encyclopedia, 2008. [Online; accessed 26-May-2008].
-
Wikipedia. Hushmail | Wikipedia, the free encyclopedia, 2008. [Online; accessed 26-May-2008].
-
-
-
-
30
-
-
70349247360
-
-
Z. Wilcox-O'Hearn. convergent encryption reconsidered, 2008. [Online; accessed 18-Aug-2008].
-
Z. Wilcox-O'Hearn. convergent encryption reconsidered, 2008. [Online; accessed 18-Aug-2008].
-
-
-
|