-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Springer-Verlag
-
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379–393. Springer-Verlag, 2001.
-
(2001)
Proc. Information Security Conference (ISC 2001), Volume 2200 of LNCS
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
3
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Springer-Verlag
-
M. Bellare, O. Goldreich, and S. Goldwasser. Incremental cryptography: The case of hashing and signing. In Advances in Cryptology—CRYPTO’94, volume 839 of LNCS, pages 216–233. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology—CRYPTO’94, Volume 839 of LNCS
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
4
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Springer-Verlag
-
J. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in Cryptology—EUROCRYPT 93, volume 765 of LNCS, pages 274–285. Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology—EUROCRYPT 93, Volume 765 of LNCS
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
5
-
-
0023436788
-
A weighted voting algorithm for replicated directories
-
J. J. Bloch, D. S. Daniels, and A. Z. Spector. A weighted voting algorithm for replicated directories. Journal of the ACM, 34(4):859–909, 1987.
-
(1987)
Journal of the ACM
, vol.34
, Issue.4
, pp. 859-909
-
-
Bloch, J.J.1
Daniels, D.S.2
Spector, A.Z.3
-
6
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12(2/3):225–244, 1994.
-
(1994)
Algorithmica
, vol.12
, Issue.2-3
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
7
-
-
0029214558
-
Designing programs that check their work
-
Jan
-
M. Blum and S. Kannan. Designing programs that check their work. J. ACM, 42(1):269–291, Jan. 1995.
-
(1995)
J. ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
9
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
To appear
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proc. CRYPTO 2002. To appear.
-
Proc. CRYPTO 2002
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
4243626563
-
-
Technical report, Center for Geometric Computing, Brown University
-
R. Cohen, M. T. Goodrich, R. Tamassia, and N. Triandopoulos. Authenticated data structures for graph and geometric searching. Technical report, Center for Geometric Computing, Brown University, 2001. http://www.cs.brown.edu/cgc/stms/papers/authDatStr.pdf.
-
(2001)
Authenticated Data Structures for Graph and Geometric Searching
-
-
Cohen, R.1
Goodrich, M.T.2
Tamassia, R.3
Triandopoulos, N.4
-
13
-
-
84957374034
-
Incremental cryptography and memory checkers
-
Fischlin, Springer-Verlag
-
Fischlin. Incremental cryptography and memory checkers. In Proc. EUROCRYPT, volume 1233 of LNCS, pages 393–408. Springer-Verlag, 1997.
-
(1997)
Proc. EUROCRYPT, Volume 1233 of LNCS
, pp. 393-408
-
-
-
14
-
-
84957806727
-
Efficient and fresh certification
-
Springer-Verlag
-
I. Gassko, P. S. Gemmell, and P. MacKenzie. Efficient and fresh certification. In Int. Workshop on Practice and Theory in Public Key Cryptography (PKC’2000), volume 1751 of LNCS, pages 342–353. Springer-Verlag, 2000.
-
(2000)
Int. Workshop on Practice and Theory in Public Key Cryptography (PKC’2000), Volume 1751 of LNCS
, pp. 342-353
-
-
Gassko, I.1
Gemmell, P.S.2
Mackenzie, P.3
-
15
-
-
84957661041
-
Secure hash-and -sign signatures without the rand om oracle
-
Springer-Verlag
-
R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and -sign signatures without the rand om oracle. In Proc. EUROCRYPT, volume 1592 of LNCS, pages 123–139. Springer-Verlag, 1999.
-
(1999)
Proc. EUROCRYPT, Volume 1592 of LNCS
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
17
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In Proc. 2001 DARPA Information Survivability Conference and Exposition, volume 2, pages 68–82, 2001.
-
(2001)
Proc. 2001 DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
18
-
-
0004216472
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs, NJ, 1995.
-
(1995)
Network Security: Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
20
-
-
0028448418
-
Distributing a search tree among a growing number of processors
-
B. Kroll and P. Widmayer. Distributing a search tree among a growing number of processors. ACM SIGMOD Record, 23(2):265–276, 1994.
-
(1994)
ACM SIGMOD Record
, vol.23
, Issue.2
, pp. 265-276
-
-
Kroll, B.1
Widmayer, P.2
-
21
-
-
84945269168
-
-
A general model for authentic data publication
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authentic data publication, 2001. http://www.cs.ucdavis.edu/~devanbu/files/model-paper.pdf.
-
(2001)
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
23
-
-
0019292439
-
Protocols for public key cryptosystems
-
IEEE Computer Society Press
-
R. C. Merkle. Protocols for public key cryptosystems. In Proc. Symp. on Security and Privacy, pages 122–134. IEEE Computer Society Press, 1980.
-
(1980)
Proc. Symp. On Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
24
-
-
84969346266
-
A certified digital signature
-
G. Brassard, editor, Springer-Verlag
-
R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO’89, volume 435 of LNCS, pages 218–238. Springer-Verlag, 1990.
-
(1990)
Proc. CRYPTO’89, Volume 435 of LNCS
, pp. 218-238
-
-
Merkle, R.C.1
-
25
-
-
85084162561
-
Certificate revocation and certificate update
-
Berkeley
-
M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. 7th USENIX Security Symposium, pages 217–228, Berkeley, 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
26
-
-
84944313325
-
Blind, auditable membership proofs
-
Springer-Verlag
-
T. Sand er, A. Ta-Shma, and M. Yung. Blind, auditable membership proofs. In Proc. Financial Cryptography (FC 2000), volume 1962 of LNCS. Springer-Verlag, 2001.
-
(2001)
Proc. Financial Cryptography (FC 2000), Volume 1962 of LNCS
-
-
Sand Er, T.1
Ta-Shma, A.2
Yung, M.3
-
27
-
-
0003851399
-
-
John Wiley and Sons, Inc., New York
-
B. Schneier. Applied Cryptography: protocols, algorithms, and source code in C. John Wiley and Sons, Inc., New York, 1994.
-
(1994)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
28
-
-
0029344123
-
Certification of computational results
-
G. F. Sullivan, D. S. Wilson, and G. M. Masson. Certification of computational results. IEEE Trans. Comput., 44(7):833–847, 1995.
-
(1995)
IEEE Trans. Comput
, vol.44
, Issue.7
, pp. 833-847
-
-
Sullivan, G.F.1
Wilson, D.S.2
Masson, G.M.3
|