-
1
-
-
84974573487
-
Fast verification of any remote procedure call: Short witness-indistinguishable one-round proofs for NP
-
W. Aiello, S. Bhatt, R. Ostrovsky and S. Rajagopalan. Fast verification of any remote procedure call: short witness-indistinguishable one-round proofs for NP. In Proc. of ICALP 2000, pp. 463-474.
-
(2000)
In Proc. of ICALP
, pp. 463-474
-
-
Aiello, W.1
Bhatt, S.2
Ostrovsky, R.3
Rajagopalan, S.4
-
2
-
-
0033554707
-
Do-it-yourself climate prediction
-
Oct
-
M. Allen. Do-it-yourself climate prediction. In Nature, 401, p. 642, Oct. 1999.
-
(1999)
Nature
, vol.401
, pp. 642
-
-
Allen, M.1
-
4
-
-
0032592494
-
Charlotte: Metacom-puting on the Web
-
A. Baratloo, M. Karaul, Z. Kedem and P. Wyckoff. Charlotte: Metacom-puting on the Web. In Future Generation Computer Systems, 15 (5-6), pp. 559-570, 1999.
-
(1999)
Future Generation Computer Systems
, vol.15
, Issue.5-6
, pp. 559-570
-
-
Baratloo, A.1
Karaul, M.2
Kedem, Z.3
Wyckoff, P.4
-
5
-
-
20244381866
-
Search for extraterrestrials|or extra cash
-
12/02/99, also available at
-
D. Bedell. Search for extraterrestrials|or extra cash. In The Dallas Mor-ning News, 12/02/99, also available at: http://www. dallasnews. com/technology/1202ptech9pcs. htm.
-
The Dallas Mor-Ning News
-
-
Bedell, D.1
-
7
-
-
20444387298
-
A technique for measuring the relative size and overlap of public Web search engines
-
K. Bharat and A. Broder. A technique for measuring the relative size and overlap of public Web search engines. In WWW7/Computer Networks 30(1-7), pp. 379-388, 1998.
-
(1998)
Www7/Computer Networks
, vol.30
, Issue.1-7
, pp. 379-388
-
-
Bharat, K.1
Broder, A.2
-
9
-
-
1642602228
-
Computationally private infor-mation retrieval with polylogarithmic communication
-
C. Cachin, S. Micali and M. Stadler. Computationally private infor-mation retrieval with polylogarithmic communication. In Proc. of EU-ROCRYPT'99, LNCS 1592, pp. 402-414, 1999.
-
(1999)
Proc. of EU-ROCRYPT'99, LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
11
-
-
84974555688
-
A cryptographic solution to a game theoretic problem
-
Y. Dodis, S. Halevi and T. Rabin. A cryptographic solution to a game theoretic problem. In Proc. of CRYPTO'00, LNCS 1880, pp. 112-131, 2000.
-
(2000)
Proc. of CRYPTO'00, LNCS
, vol.1880
, pp. 112-131
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
12
-
-
85034638281
-
Encrypting problem instances: Or…, Can you take advan-tage of someone without having to trust him?
-
J. Feigenbaum. Encrypting problem instances: Or…, Can you take advan-tage of someone without having to trust him? In Proc. of CRYPTO 1985, LNCS 218, pp. 477-488.
-
Proc. of CRYPTO 1985, LNCS
, vol.218
, pp. 477-488
-
-
Feigenbaum, J.1
-
14
-
-
18944401242
-
-
TR96-1600, Department of Computer Science, Cornell University
-
Y. Minsky, R. van Renesse, F. Schneider and S Stoller. Cryptographic sup-port for fault-tolerant distributed computing. TR96-1600, Department of Computer Science, Cornell University, 1996.
-
(1996)
Cryptographic Sup-Port for Fault-Tolerant Distributed Computing
-
-
Minsky, Y.1
Van Renesse, R.2
Schneider, F.3
Stoller, S.4
-
18
-
-
0032592479
-
Bayanihan: Building and studying volunteer computing systems using Java
-
L. Sarmenta and S. Hirano. Bayanihan: Building and studying volunteer computing systems using Java. In Future Generation Computer Systems, 15 (5-6), pp. 675-686, 1999.
-
(1999)
Future Generation Computer Systems
, vol.15
, Issue.5-6
, pp. 675-686
-
-
Sarmenta, L.1
Hirano, S.2
-
20
-
-
84937585378
-
-
SETI@home
-
SETI@home, http://setiathome. berkeley. edu.
-
-
-
-
22
-
-
0002717089
-
Mobile Agents and Security
-
(Ed.)
-
G. Vigna (Ed.). Mobile Agents and Security. LNCS 1419, 1998.
-
(1998)
LNCS
, vol.1419
-
-
Vigna, G.1
-
23
-
-
0031274275
-
Software reliability via run-time result-checking
-
H. Wasserman and M. Blum. Software reliability via run-time result-checking. In Journal of the ACM, 44(6), pp. 826-849, 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.6
, pp. 826-849
-
-
Wasserman, H.1
Blum, M.2
|