-
1
-
-
84898960610
-
-
ACM, New York
-
M. Ben-Or, S. Goldwasser, A. Wigderson: Completeness theorems for non-cryptographic fault-tolerant distributed computation; 20th STOC, ACM, New York 1988, 1-10.
-
(1988)
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation; 20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0022145479
-
Security without Identification: Transaction Systems to make Big Brother Obsolete
-
D. Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; CACM 28/10 (1985) 1030-1044.
-
(1985)
CACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
84898947315
-
-
20th STOC, ACM, NY
-
D. Chaum, C. Crépeau, I. Damgård: Multiparty unconditional secure protocols; 20th STOC, ACM, NY 1988,11-19.
-
(1988)
Multiparty Unconditional Secure Protocols
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
11
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, R. L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks; SIAM J. Comput 17/2 (1988) 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
14
-
-
0002876117
-
-
Multi-User Communication Systems; Edited by G. Longo; CISM Courses and Lectures No. 265, International Centre for Mechanical Sciences; Springer-Verlag, Wien
-
J. L. Massey: Collision-Resolution Algorithms and Random-Access Communications; Multi-User Communication Systems; Edited by G. Longo; CISM Courses and Lectures No. 265, International Centre for Mechanical Sciences; Springer-Verlag, Wien 1981, 73-137.
-
(1981)
Collision-Resolution Algorithms and Random-Access Communications
, pp. 73-137
-
-
Massey, J.L.1
-
15
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
M. Pease, R. Shostak, L. Lamport: Reaching Agreement in the Presence of Faults; JACM, 27/2 (1980) 228-234.
-
(1980)
JACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
19
-
-
0011583205
-
How to implement ISDNs without user observability - Some remarks
-
Universität Karlsruhe
-
A. Pfitzmann: How to implement ISDNs without user observability - Some remarks; Fakultät für Informatik, Intemer Bericht 14/85, Universität Karlsruhe 1986.
-
(1986)
Fakultät für Informatik, Intemer Bericht
, vol.14
, Issue.85
-
-
Pfitzmann, A.1
-
20
-
-
0345955264
-
Datenschutz garantierende offene Kommunikationsnetze
-
A. Pfitzmann, B. Pfitzmann, M. Waidnen Datenschutz garantierende offene Kommunikationsnetze; Informatik- Spektrum 11/3 (1988) 118-142.
-
(1988)
Informatik- Spektrum
, vol.11
, Issue.3
, pp. 118-142
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidnen, M.3
-
21
-
-
0023331864
-
Networks without user observability - design options
-
Springer- Verlag, Berlin 1986, 245-253; revised version: Computers & Security
-
A. Pfitzmann, M. Waidner: Networks without user observability - design options; Eurocrypt '85, LNCS 219, Springer- Verlag, Berlin 1986, 245-253; revised version: Computers & Security 6/2 (1987) 158-166.
-
(1987)
Eurocrypt '85, LNCS 219
, vol.6
, Issue.2
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
22
-
-
0001262977
-
Probabilistic Algorithms in Finite Fields
-
M. O. Rabin: Probabilistic Algorithms in Finite Fields; SIAM J. Comput 9/2 (1980) 273-280.
-
(1980)
SIAM J. Comput
, vol.9
, Issue.2
, pp. 273-280
-
-
Rabin, M.O.1
-
23
-
-
0024015453
-
A Survey of Information Authentication
-
GJ. Simmons: A Survey of Information Authentication; Proc. IEEE 76/5 (1988) 603-620.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 603-620
-
-
Simmons, G.J.1
-
24
-
-
0004141908
-
-
2nd ed., Prentice-Hall, Englewood Cliffs
-
A. S. Tanenbaum: Computer Networks; 2nd ed., Prentice-Hall, Englewood Cliffs 1988.
-
(1988)
Computer Networks
-
-
Tanenbaum, A.S.1
-
26
-
-
85034622087
-
-
Crypto '84, LNCS 196, Springer-Verlag, Berlin
-
U. V. Vazirani, V. V. Vazirani: Efficient and Secure Pseudo-Random Number Generation (extended abstract); Crypto '84, LNCS 196, Springer-Verlag, Berlin 1985, 193-202.
-
(1985)
Efficient and Secure Pseudo-Random Number Generation (Extended Abstract);
, pp. 193-202
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
27
-
-
35048818207
-
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks
-
Universitat Karlsruhe
-
M. Waidner, B. Pfitzmann: Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks; Fakultät für Informatik, Intemer Bericht 5/89, Universitat Karlsruhe 1989.
-
(1989)
Fakultät für Informatik, Intemer Bericht
, vol.5
, Issue.89
-
-
Waidner, M.1
Pfitzmann, B.2
|