-
1
-
-
84947906522
-
The exact security of digital signatures-how to sign with RSA and rabin
-
U. Maurer, editor Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. The exact security of digital signatures-how to sign with RSA and Rabin. In U. Maurer, editor, Advances n Cryptology-Eurocrypt 1996, Volume 1070 of Lecture Notes n Computer Scince, pages 399-416. Springer-Verlag, 1996.
-
(1996)
Advances N Cryptology-Eurocrypt 1996, Volume 1070 of Lecture Notes N Computer Scince
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
0003563576
-
The echo distributed file system
-
Pal Alto, A, September
-
Andrew D. Birrell, Andy Hisgen, Chuck Jerian, Timothy Mann, and Garret Swart. The Echo distributed file system. Technical Report 111, Digital Systems Research enter, Pal Alto, A, September 1993.
-
(1993)
Technical Report 111, Digital Systems Research Enter
-
-
Birrell, A.D.1
Hisgen, A.2
Jerian, C.3
Mann, T.4
Swart, G.5
-
3
-
-
0003906999
-
NFS version 3 protocol specification
-
, Network Working Group, June
-
B. Callaghan, B. Pawlowski, and P. Staubach. NFS version 3 protocol specification. RF 1813, Network Working Group, June 1995.
-
(1995)
RF 1813
-
-
Callaghan, B.1
Pawlowski, B.2
Staubach, P.3
-
6
-
-
0012341652
-
Proactive recovery in a byzantine-fault-tolerant system
-
Submitted for publication
-
Miguel Castro and Barbara Liskov. Proactive recovery in a byzantine-fault-tolerant system. Technical report, Massachusetts Institute of Technology, 1999. Submitted for publication, http://www.pmg.lesmit.du.roapplati/rcovery.pdf.
-
(1999)
Technical Report, Massachusetts Institute of Technology
-
-
Castro, M.1
Liskov, B.2
-
7
-
-
85084162164
-
A toolkit approach to partially disconnected operation
-
USEX, January
-
D. Duchamp. A toolkit approach to partially disconnected operation. In Proc. USENIX 1997 Ann. Technical Conf., pages 305-318. USEX, January 1997.
-
(1997)
Proc. USENIX 1997 Ann. Technical Conf.
, pp. 305-318
-
-
Duchamp, D.1
-
8
-
-
0003367255
-
Domain name system security extensions
-
Network Working Group, January
-
D. Eastlake and C. Kaufman. Domain name system security extensions. RFC 2065, Network Working Group, January 1997.
-
(1997)
RFC 2065
-
-
Eastlake, D.1
Kaufman, C.2
-
9
-
-
0003629991
-
-
FIPS 180-1 U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. ecure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Ecure Hash Standard
-
-
-
11
-
-
0004249393
-
-
Internet draft (draft-freierssl-version3-02.txt), Net work Working Group, November Work i progress
-
Alan O. Freier, Philip Karlton, and Paul C Kocher. The SSL protocol version 3.0. Internet draft (draft-freierssl-version3-02.txt), Net work Working Group, November 1996. Work i progress
-
(1996)
The SSL Protocol Version 3.0
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
13
-
-
84889351757
-
How to sign digi tal streams
-
Springer-Verlag Lec ture Notes i omputer Science Volume 1294
-
R. Gennaro and P. Rohatgi. How to sign digi tal streams. In Advances in Cryptology-Crypto '97, pages 180-197. Springer-Verlag, 1997. Lec ture Notes i omputer Science Volume 1294.
-
(1997)
Advances in Cryptology-Crypto '97
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
15
-
-
0001183491
-
Web caching with consis tent hashing
-
Toronto, anada, May
-
David Karger, Tom Leighton, Danny Lewin, and Alex Sherman. Web caching with consis tent hashing. In The eighth Word Wide Web Conference, Toronto, anada, May 1999.
-
(1999)
The Eighth Word Wide Web Conference
-
-
Karger, D.1
Leighton, T.2
Lewin, D.3
Sherman, A.4
-
16
-
-
84968422314
-
How to build a trusted database sys tem on untrusted storage
-
San Diego, A, ctober
-
U. Maheshwari, Radek Vingralek, and William Shapiro. How to build a trusted database sys tem on untrusted storage. In Fourth Symposium on Operating Systems Design and Implemntaon, San Diego, A, ctober 2000.
-
(2000)
Fourth Symposium on Operating Systems Design and Implemntaon
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, W.3
-
17
-
-
0042352260
-
Separating key management from file system security
-
iawah sland, S M
-
David Mazières, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 124-139, iawah sland, S, 1999. M.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Frans Kaashoek, M.3
Witchel, E.4
-
18
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Carl Pomerance, editor Berlin Springer-Verlag. Lecture Notes i omputer Science
-
R. C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Crypology-Crypto '87, pages 369-378, Berlin, 1987. Springer-Verlag. Lecture Notes i omputer Science Volume 293.
-
(1987)
Advances in Crypology-Crypto '87
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
20
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
Singapore, November
-
Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. CC'99, Singapore, November 1999.
-
(1999)
CC'99
-
-
Rohatgi, P.1
-
22
-
-
0042985426
-
Scalable, secure and highly available file access in a distributed workstation environment
-
May 990
-
M. Satyanarayanan. Scalable, secure and highly available file access in a distributed workstation environment. IE Compr, pages 9-21, May 990.
-
IE Compr
, pp. 9-21
-
-
Satyanarayanan, M.1
-
24
-
-
0003600771
-
XDR: External data representation standard
-
Network Working Group, August
-
R. Srinivasan. XDR: External data representation standard. RF 1832, Network Working Group, August 1995.
-
(1995)
RF 1832
-
-
Srinivasan, R.1
-
25
-
-
85029374811
-
-
fp:/fp.sgi.co/sgi/srcttcp/
-
TTP. fp:/fp.sgi.co/sgi/srcttcp/.
-
TTP
-
-
-
26
-
-
0019080452
-
A modification of the RSA publickey encryption procedure
-
November 180
-
Hugh C. Williams. A modification of the RSA publickey encryption procedure. IEEE Transactions on Information Theory, T-26(6):726-729, November 180.
-
IEEE Transactions on Information Theory
, vol.T-26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
27
-
-
0010227314
-
Digital signatures for flows and multicasts
-
Austin, TX, ctober
-
C. Wong and S. Lam. Digital signatures for flows and multicasts. In IEE IC'98, Austin, TX, ctober 1998.
-
(1998)
IEE IC'98
-
-
Wong, C.1
Lam, S.2
-
28
-
-
85029380558
-
-
R software packaging ol www.rpm.org
-
www.rpm.org. R software packaging ol www.rpm.org
-
-
-
|