-
1
-
-
84978405320
-
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
-
Dec
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. In Proc. of the 5th Symp. on Operating Systems Design and Implementation. Dec. 2002.
-
(2002)
Proc. of the 5th Symp. on Operating Systems Design and Implementation
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
2
-
-
84907307679
-
-
Harcourt, Brace & World, Inc.
-
R. A. Beaumont. Linear algebra. Harcourt, Brace & World, Inc., 1965.
-
(1965)
Linear Algebra
-
-
Beaumont, R.A.1
-
5
-
-
85028918825
-
Threshold schemes with disenrollment
-
Aug
-
B. Blakley, G. R. Blakley, A . H. Chan, and J. L. Massey. Threshold schemes with disenrollment. In Proc. of CRYPTO 1992, the 12th Ann. Intl. Cryptology Conf., pp 540-548. Aug. 1992.
-
(1992)
Proc. of CRYPTO 1992, the 12th Ann. Intl. Cryptology Conf.
, pp. 540-548
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.L.4
-
7
-
-
0030257491
-
Fully dynamic secret sharing schemes
-
Oct
-
C. Blundo, A. Cresti, A. D. Santis, and U. Vaccaro. Fully dynamic secret sharing schemes. Theoretical Comput. Sci., 165(2):407-440, Oct. 1996.
-
(1996)
Theoretical Comput. Sci.
, vol.165
, Issue.2
, pp. 407-440
-
-
Blundo, C.1
Cresti, A.2
Santis, A.D.3
Vaccaro, U.4
-
8
-
-
0034444963
-
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
-
June
-
W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In Proc. of SIGMETRICS 2000, the Intl. Conf. on Measurement and Modeling of Computing Systems, pp 34-43. June 2000.
-
(2000)
Proc. of SIGMETRICS 2000, the Intl. Conf. on Measurement and Modeling of Computing Systems
, pp. 34-43
-
-
Bolosky, W.J.1
Douceur, J.R.2
Ely, D.3
Theimer, M.4
-
10
-
-
0033279537
-
Aprototype implementation of archival intermemory
-
Aug
-
Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti, and P. Yianilos. Aprototype implementation of archival intermemory. In Proc. of the 4th ACM Intl. Conf. on Digital Libraries, pp 28-37. Aug. 1999.
-
(1999)
Proc. of the 4th ACM Intl. Conf. on Digital Libraries
, pp. 28-37
-
-
Chen, Y.1
Edler, J.2
Goldberg, A.3
Gottlieb, A.4
Sobti, S.5
Yianilos, P.6
-
16
-
-
84958676203
-
Proactive RSA
-
Aug
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Proactive RSA. In Proc. of CRYPTO 1997, the 17th Ann. Intl. Cryptology Conf., pp 440-454. Aug. 1997.
-
(1997)
Proc. of CRYPTO 1997, the 17th Ann. Intl. Cryptology Conf.
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
19
-
-
0012577752
-
Secure distributed storage and retrieval
-
July
-
J. A. Garay, R. Gennaro, C. S. Jutla, and T. Rabin. Secure distributed storage and retrieval. Theoretical Comput. Sci., 243(1-2):363-389, July 2000.
-
(2000)
Theoretical Comput. Sci.
, vol.243
, Issue.1-2
, pp. 363-389
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.S.3
Rabin, T.4
-
20
-
-
84947926543
-
Robust threshold DSS signatures
-
May
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Proc. of EUROCRYPT 1996, the Intl. Conf. on the Theory and Application of Cryptographic Techniques, pp 354-371. May 1996.
-
(1996)
Proc. of EUROCRYPT 1996, the Intl. Conf. on the Theory and Application of Cryptographic Techniques
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
25
-
-
0030646698
-
Proactive public key and signature systems
-
Apr
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In Proc. of the 4th ACM Intl. Conf. on Computer and Communications Security, pp 100-110. Apr. 1997.
-
(1997)
Proc. of the 4th ACM Intl. Conf. on Computer and Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
26
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Aug
-
A. Herzberg, S. Jarekci, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Proc. of CRYPTO 1995, the 15th Ann. Intl. Cryptology Conf., pp 339-352. Aug. 1995.
-
(1995)
Proc. of CRYPTO 1995, the 15th Ann. Intl. Cryptology Conf.
, pp. 339-352
-
-
Herzberg, A.1
Jarekci, S.2
Krawczyk, H.3
Yung, M.4
-
30
-
-
0034440650
-
OceanStore: An architecture for globalstate persistent storage
-
Nov
-
J. Kubiatowicz, D. Bindel, P. Eaton, Y. Chen, D. Geels, R. Gummadi, S. Rhea, W. Weimer, C. Wells, H. Weatherspoon, and B. Zhao. OceanStore: An architecture for globalstate persistent storage. In Proc. of ASPLOS IX, the Intl. Conf. on Architectural Support for Programming Languages and Operating Systems, pp 190-201, Nov. 2000.
-
(2000)
Proc. of ASPLOS IX, the Intl. Conf. on Architectural Support for Programming Languages and Operating Systems
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Eaton, P.3
Chen, Y.4
Geels, D.5
Gummadi, R.6
Rhea, S.7
Weimer, W.8
Wells, C.9
Weatherspoon, H.10
Zhao, B.11
-
31
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Prog. Lang. Syst., 4(3):382-401, July 1982.
-
(1982)
ACM Trans. Prog. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
34
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or cheating
-
Nov
-
T. Rabin. Robust sharing of secrets when the dealer is honest or cheating. J. ACM, 41(6):1089-1109, Nov. 1994.
-
(1994)
J. ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
37
-
-
0011800004
-
Asecure group membership protocol
-
Jan
-
M. K. Reiter. Asecure group membership protocol. IEEE Trans. Softw. Eng., 22(1):31-42, Jan. 1996.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 31-42
-
-
Reiter, M.K.1
-
39
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant, web publishing system
-
Aug
-
M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. of the 9th USENIX Security Symp., pp 59-72. Aug. 2000.
-
(2000)
Proc. of the 9th USENIX Security Symp.
, pp. 59-72
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
42
-
-
33645459930
-
-
Technical Report Sch. of Computer Science, Carnegie Mellon University, Pittsburgh, PA15213, Sept
-
T. M. Wong, C. Wang, and J. M. Wing. Verifiable secret redistribution for threshold sharing schemes. Technical Report CMU-CS-02-114-R, Sch. of Computer Science, Carnegie Mellon University, Pittsburgh, PA15213, Sept. 2002.
-
(2002)
Verifiable Secret Redistribution for Threshold Sharing Schemes
-
-
Wong, T.M.1
Wang, C.2
Wing, J.M.3
-
43
-
-
0142066947
-
-
Tech. Rep. Sch. of Computer Science, Carnegie Mellon University, Pittsburgh, PA15213, May
-
J. J. Wylie, M. Bakkaloglu, V. Pandurangan, M. W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, and P. K. Khosla. Selecting the right data distribution scheme for a survivable storage system. Tech. Rep. CMU-CS- 01-120, Sch. of Computer Science, Carnegie Mellon University, Pittsburgh, PA15213, May 2001.
-
(2001)
Selecting the Right Data Distribution Scheme for A Survivable Storage System
-
-
Wylie, J.J.1
Bakkaloglu, M.2
Pandurangan, V.3
Bigrigg, M.W.4
Oguz, S.5
Tew, K.6
Williams, C.7
Ganger, G.R.8
Khosla, P.K.9
-
44
-
-
0342410321
-
Survivable information storage systems
-
Aug
-
J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kiliççöte, and P. K. Khosla. Survivable information storage systems. IEEE Computer, pp 61-68, Aug. 2000.
-
(2000)
IEEE Computer
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, G.R.4
Kiliççöte, H.5
Khosla, P.K.6
-
46
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
Nov
-
L. Zhou, F. B. Schneider, and R. van Renesse. COCA: A secure distributed on-line certification authority. ACM Trans. Comput. Syst., 20(4):329-368, Nov. 2002.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|