-
1
-
-
0024861622
-
On the complexity of radio communication
-
[ABLP89]
-
[ABLP89] N. Alon, A. Bar-Noy, N. Linial, and D. Peleg, "On the complexity of radio communication," ACM STOC, 1989, 274-285.
-
(1989)
ACM STOC
, pp. 274-285
-
-
Alon, N.1
Bar-Noy, A.2
Linial, N.3
Peleg, D.4
-
2
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
[Bea89]
-
[Bea89] D. Beaver, "Multiparty protocols tolerating half faulty processors," Proc. Crypto ’89, 560-572.
-
Proc. Crypto ’89
, pp. 560-572
-
-
Beaver, D.1
-
3
-
-
0039093711
-
Reliable communication over partially authenticated networks
-
[BF97], Springer-Verlag LNCS 1320
-
[BF97] A. Beimel and M. Franklin, "Reliable communication over partially authenticated networks," Proc. Workshop on Distributed Algorithms (WDAG), Springer-Verlag LNCS 1320, 1997, 245-259.
-
(1997)
Proc. Workshop on Distributed Algorithms (WDAG)
, pp. 245-259
-
-
Beimel, A.1
Franklin, M.2
-
4
-
-
0027188428
-
Asynchronous secure computation
-
[BCG93]
-
[BCG93] M. Ben-Or, R. Canetti, and O. Goldreich, "Asynchronous secure computation," ACM STOC, 1993, 52-61.
-
(1993)
ACM STOC
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computing
-
[BGW88]
-
[BGW88] M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computing," ACM STOC, 1988, 1-10.
-
(1988)
ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0022144724
-
Asynchronous consensus and broadcast protocols
-
[BT85]
-
[BT85] G. Bracha and S. Toueg, "Asynchronous consensus and broadcast protocols", JACM 32(4): 824-840 (1985).
-
(1985)
JACM
, vol.32
, Issue.4
, pp. 824-840
-
-
Bracha, G.1
Toueg, S.2
-
7
-
-
0345872645
-
Trust and Security: A New Look at the Byzantine Generals Problem
-
[BDK97], American Mathematical Society, (to appear)
-
[BDK97] M. Burmester, Y. Desmedt, and G. Kabatianski, "Trust and Security: A New Look at the Byzantine Generals Problem", Network Threats, DI-MACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, (to appear).
-
Network Threats, DI-MACS Series in Discrete Mathematics and Theoretical Computer Science
-
-
Burmester, M.1
Desmedt, Y.2
Kabatianski, G.3
-
8
-
-
84898947315
-
Multiparty unconditional secure protocols
-
[CCD88]
-
[CCD88] D. Chaum, C. Crepeau, said I. Damgard, "Multiparty unconditional secure protocols," ACM STOC, 1988, 11-19.
-
(1988)
ACM STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, S.I.3
-
10
-
-
0009768331
-
The Byzantine Generals strike again
-
[Dol82]
-
[Dol82] D. Dolev, "The Byzantine Generals strike again," J. Algorithms 3:14-30, 1982.
-
(1982)
J. Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
11
-
-
0027341860
-
Perfectly secure message transmission
-
[DDWY93]
-
[DDWY93] D. Dolev, C. Dwork, O. Waarts, and M. Yung, "Perfectly secure message transmission," JACM 40(1): 17-47, 1993.
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
12
-
-
1142282324
-
Secure hypergraphs: Privacy from partied broadcast
-
[FY95]
-
[FY95] M. Franklin and M. Yung, "Secure hypergraphs: privacy from partied broadcast," ACM STOC, 1995, 36-44.
-
(1995)
ACM STOC
, pp. 36-44
-
-
Franklin, M.1
Yung, M.2
-
13
-
-
0026367257
-
Fault-tolerant computation in the full information model
-
[GGL91]
-
[GGL91] O. Goldreich, S. Goldwasser, and N. Linial, "Fault-tolerant computation in the full information model," IEEE FOCS, 1991, 447-457.
-
(1991)
IEEE FOCS
, pp. 447-457
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
14
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
[PSL80]
-
[PSL80] M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults", JACM 27(2): 228-234, 1980.
-
(1980)
JACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
16
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
[Rab94]
-
[Rab94] T. Rabin, "Robust sharing of secrets when the dealer is honest or faulty," JACM 41(6):1089-1109, 1994.
-
(1994)
JACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
17
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
[RB89]
-
[RB89] T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority," ACM STOC, 1989, 73-85.
-
(1989)
ACM STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|