-
1
-
-
84957678021
-
Fast digital identity revocation
-
Advances in Cryptology - CRYPTO '98, Springer-Verlag
-
W. Aiello, S. Lodha, and R. Ostrovsky. Fast digital identity revocation. In Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
-
2
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Advances in Cryptology - CRYPTO '94, Springer-Verlag
-
M. Bellare, O. Goldreich, and S. Goldwasser. Incremental cryptography: The case of hashing and signing. In Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 216-233. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
4
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Advances in Cryptology - EUROCRYPT 93
-
J. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in Cryptology - EUROCRYPT 93, volume 765 of Lecture Notes in Computer Science, pages 274-285, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
5
-
-
0023436788
-
A weighted voting algorithm for replicated directories
-
J. J. Bloch, D. S. Daniels, and A. Z. Spector. A weighted voting algorithm for replicated directories. Journal of the ACM, 34(4):859-909, 1987.
-
(1987)
Journal of the ACM
, vol.34
, Issue.4
, pp. 859-909
-
-
Bloch, J.J.1
Daniels, D.S.2
Spector, A.Z.3
-
6
-
-
84964537271
-
Program result checking: A new approach to making programs more reliable
-
S. C. Andrzej Lingas, Rolf G. Karlsson, editor, Automata, Languages and Programming, 20th International Colloquium, Springer-Verlag
-
M. Blum. Program result checking: A new approach to making programs more reliable. In S. C. Andrzej Lingas, Rolf G. Karlsson, editor, Automata, Languages and Programming, 20th International Colloquium, volume 700 of Lecture Notes in Computer Science, pages 1-14. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.700
, pp. 1-14
-
-
Blum, M.1
-
7
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12(2/3):225-244, 1994.
-
(1994)
Algorithmica
, vol.12
, Issue.2-3
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
8
-
-
0029214558
-
Designing programs that check their work
-
Jan.
-
M. Blum and S. Kannan. Designing programs that check their work. J. ACM, 42(1):269-291, Jan. 1995.
-
(1995)
J. ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
10
-
-
84964516138
-
The science archive for the Sloan Digital Sky Survey
-
R. J. Brunner, L. Csabai, A. S. Szalay, A. Connolly, G. P. Szokoly, and K. Ramaiyer. The science archive for the Sloan Digital Sky Survey. In Proceedings of Astronomical Data Analysis Software and Systems Conference V, 1996.
-
(1996)
Proceedings of Astronomical Data Analysis Software and Systems Conference V
-
-
Brunner, R.J.1
Csabai, L.2
Szalay, A.S.3
Connolly, A.4
Szokoly, G.P.5
Ramaiyer, K.6
-
13
-
-
84957374034
-
Incremental cryptography and memory checkers
-
EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT
-
Fischlin. Incremental cryptography and memory checkers. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, LNCS 1233, pages 393-408, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 393-408
-
-
Fischlin1
-
15
-
-
84957806727
-
Efficient and fresh certification
-
International Workshop on Practice and Theory in Public Key Cryptography '2000 (PKC '2000), Melbourne, Australia, Springer-Verlag, Berlin Germany
-
I. Gassko, P. S. Gemmell, and P. MacKenzie. Efficient and fresh certification. In International Workshop on Practice and Theory in Public Key Cryptography '2000 (PKC '2000), Lecture Notes in Computer Science, pages 342-353, Melbourne, Australia, 2000. Springer-Verlag, Berlin Germany.
-
(2000)
Lecture Notes in Computer Science
, pp. 342-353
-
-
Gassko, I.1
Gemmell, P.S.2
MacKenzie, P.3
-
21
-
-
0004216472
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs, NJ, 1995.
-
(1995)
Network Security: Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
22
-
-
84958063551
-
On certificate revocation and validation
-
Proc. International Conference on Financial Cryptography
-
P. C. Kocher. On certificate revocation and validation. In Proc. International Conference on Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1465
-
-
Kocher, P.C.1
-
25
-
-
0042309639
-
Data collection for the Sloan Digital Sky Survey - A network-flow heuristic
-
R. Lupton, F. M. Maley, and N. Young. Data collection for the Sloan Digital Sky Survey - A network-flow heuristic. Journal of Algorithms, 27(2):339-356, 1998.
-
(1998)
Journal of Algorithms
, vol.27
, Issue.2
, pp. 339-356
-
-
Lupton, R.1
Maley, F.M.2
Young, N.3
-
26
-
-
0009554659
-
Protocols for public key cryptosystems
-
IEEE Computer Society Press
-
R. C. Merkle. Protocols for public key cryptosystems. In Proc. Symp. on Security and Privacy. IEEE Computer Society Press, 1980.
-
(1980)
Proc. Symp. on Security and Privacy
-
-
Merkle, R.C.1
-
27
-
-
84969346266
-
A certified digital signature
-
G. Brassard, editor, Advances in Cryptology - CRYPTO '89, Springer-Verlag
-
R. C. Merkle. A certified digital signature. In G. Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 218-238. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
28
-
-
0004179384
-
-
Technical Report MIT Laboratory for Computer Science
-
S. Micali. Efficient certificate revocation. Technical Report TM-542b, MIT Laboratory for Computer Science, 1996.
-
(1996)
Efficient Certificate Revocation
-
-
Micali, S.1
-
30
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Commun. ACM, 33(6):668-676, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
31
-
-
0003851399
-
-
John Wiley and Sons, Inc., New York
-
B. Schneier. Applied cryptography: protocols, algorithms, and sourcecode in C. John Wiley and Sons, Inc., New York, 1994.
-
(1994)
Applied Cryptography: Protocols, Algorithms, and Sourcecode in C
-
-
Schneier, B.1
-
32
-
-
0029344123
-
Certification of computational results
-
G. F. Sullivan, D. S. Wilson, and G. M. Masson. Certification of computational results. IEEE Trans. Comput., 44(7):833-847, 1995.
-
(1995)
IEEE Trans. Comput.
, vol.44
, Issue.7
, pp. 833-847
-
-
Sullivan, G.F.1
Wilson, D.S.2
Masson, G.M.3
|