-
1
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Proc. Crypto'98, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, P. Rogaway. "Relations Among Notions of Security for Public-Key Encryption Schemes." Proc. Crypto'98, LNCS 1462, Springer-Verlag, 26-45 (1998).
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
85062838317
-
Safeguarding Cryptographic Keys
-
G.R. Blakley. "Safeguarding Cryptographic Keys." Proc. AFIPS Conf. 48:313-317 (1979).
-
(1979)
Proc. AFIPS Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
0027764777
-
A Cryptographic File System for Unix
-
M. Blaze. "A Cryptographic File System for Unix." Proc. ACM CCCS '93, (1993).
-
(1993)
Proc. ACM CCCS '93
-
-
Blaze, M.1
-
4
-
-
84947254092
-
Key-Insulated Public Key Cryptosystems
-
Proc. EuroCrypt'02, Springer-Verlag
-
Y. Dodis, J. Katz, S. Xu, M. Yung. "Key-Insulated Public Key Cryptosystems. Proc. EuroCrypt'02, LNCS 2332, Springer-Verlag, 65-82 (2002).
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
5
-
-
0027341860
-
Perfectly Secure Message Transmission
-
D. Dolev, C. Dwork, O. Waarts, M. Yung. "Perfectly Secure Message Transmission." JACM 40:1:17-47 (1993).
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
9
-
-
84957626176
-
Proactive Secret Sharing Or: How to Cope with Perpetual Leakage
-
Proc. Crypto'95, Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung. "Proactive Secret Sharing Or: How to Cope with Perpetual Leakage." Proc. Crypto'95, LNCS 963, Springer-Verlag, 339-352 (1995).
-
(1995)
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
10
-
-
84986583298
-
Scale and Performance in a Distributed File System
-
J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, M. West. "Scale and Performance in a Distributed File System." ACM TOCS 6:1 (1988).
-
(1988)
ACM TOCS
, vol.6
, pp. 1
-
-
Howard, J.1
Kazar, M.2
Menees, S.3
Nichols, D.4
Satyanarayanan, M.5
Sidebotham, R.6
West, M.7
-
12
-
-
84962702099
-
-
Microsoft Corporation. "Encrypting File System for Windows 2000." www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp, (2002).
-
(2002)
Encrypting File System for Windows 2000
-
-
-
15
-
-
0024641589
-
Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance
-
M.O. Rabin. "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance." JACM 36:2:335-348 (1989).
-
(1989)
JACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
16
-
-
0001174154
-
Polynomial Codes over Certain Finite Fields
-
June
-
I.S. Reed, G. Solomon. "Polynomial Codes over Certain Finite Fields." SIAM J. Appl. Math, 300-304 (June 1960).
-
(1960)
SIAM J. Appl. Math
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
18
-
-
84962657590
-
-
J. Satran, D. Smith, K. Meth, O. Biran, J. Hafner, C. Sapuntzakis, M. Bakke, M. Wakeley, L. Dalle Ore, P. Von Stamwitz, R. Haagens, M. Chadalapaka, E. Zeidner, Y. Klein. Internet Draft - iSCSI, www.ietf.org/internet-drafts/draft-ietf-ips/iscsi-08.txt (2001).
-
(2001)
Internet Draft - iSCSI
-
-
Satran, J.1
Smith, D.2
Meth, K.3
Biran, O.4
Hafner, J.5
Sapuntzakis, C.6
Bakke, M.7
Wakeley, M.8
Dalle Ore, L.9
Von Stamwitz, P.10
Haagens, R.11
Chadalapaka, M.12
Zeidner, E.13
Klein, Y.14
-
19
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. "How to Share a Secret." CACM 22:612-613 (1979).
-
(1979)
CACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
84858537280
-
-
E. Swank. "SecureDrive." www.stack.nl/~galactus/remailers/securedrive.html, (1993/2002).
-
(1993)
SecureDrive
-
-
Swank, E.1
|