-
3
-
-
0025137207
-
The Round Complexity of Secure Protocols
-
ACM
-
Beaver D., S. Micali and P. Rogaway, The Round Complexity of Secure Protocols, STOC 1990, ACM, pp. 503-513.
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
84898960610
-
Completeness Theorem for Noncryptographic Fault-tolerant Distributed Computing
-
ACM
-
Ben-Or M., S. Goldwasser and A. Wigderson, Completeness Theorem for Noncryptographic Fault-tolerant Distributed Computing, STOC 1988, ACM, pp. 1-10.
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
ACM
-
D. Chaum, C. Crepeau and I. Damgard, Multiparty Unconditionally Secure Protocols, STOC 1988, ACM, pp. 11-19.
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
8
-
-
0004246220
-
-
h. D. dissertation, UCS
-
F. Cohen, Computer Viruses, P h. D. dissertation, UCS, 1986.
-
(1986)
Computer Viruses
-
-
Cohen, F.1
-
9
-
-
0012451287
-
New Models and Algorithms for Future Networks
-
I. Cidon, I. Goapl, and S. Kutten, New Models and Algorithms for Future Networks, 7th ACM PODC, pp. 75-89.
-
7th ACM PODC
, pp. 75-89
-
-
Cidon, I.1
Goapl, I.2
Kutten, S.3
-
11
-
-
84976834622
-
Self-Stabilizing Systems in spite of Distributed Control
-
E. W. Dijkstra, Self-Stabilizing Systems in spite of Distributed Control, CACM1, 1974, pp. 643-644.
-
(1974)
CACM1
, pp. 643-644
-
-
Dijkstra, E.W.1
-
13
-
-
0347010591
-
Making Data Structure Persistent
-
ACM
-
J. Driscoll, N. Sarnak, D. Sleator, and R. Tarjan, Making Data Structure Persistent, STOC 1986, ACM.
-
(1986)
STOC
-
-
Driscoll, J.1
Sarnak, N.2
Sleator, D.3
Tarjan, R.4
-
14
-
-
0024663403
-
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
-
M. Eichin and J. Rochlis, With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988, IEEE Sym. on Security and Privacy, 1989, pp. 326-343.
-
(1989)
IEEE Sym. on Security and Privacy
, pp. 326-343
-
-
Eichin, M.1
Rochlis, J.2
-
18
-
-
85054995563
-
Cryptographic Computations and the Public-Key Model
-
Springer-Verlag
-
Z. Galil, S. Haber and M. Yung, Cryptographic Computations and the Public-Key Model, The 7th Crypto 1987, Springer-Verlag, pp. 135-155.
-
(1987)
The 7th Crypto
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
19
-
-
0022914590
-
Proofs that Yield Nothing But their Validity
-
IEEE
-
O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing But their Validity, FOCS 1986, IEEE, pp. 174-187.
-
FOCS 1986
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
0021941417
-
The Knowledge Complexity of Interactive Proof-Systems
-
ACM
-
S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, STOC 1985, ACM, pp. 291-304.
-
STOC 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
0023168930
-
Limiting the Damage Potential of Discretionary Trojan Horses
-
P.A. Kager, Limiting the Damage Potential of Discretionary Trojan Horses, IEEE Sym. on Security and Privacy, 1987, pp. 32-37.
-
(1987)
IEEE Sym. on Security and Privacy
, pp. 32-37
-
-
Kager, P.A.1
-
27
-
-
0023207670
-
The Design of an Effective Auditing Subsystem
-
J. Piccioto, The Design of an Effective Auditing Subsystem, IEEE Sym. on Security and Privacy, 1987, pp. 13-22.
-
(1987)
IEEE Sym. on Security and Privacy
, pp. 13-22
-
-
Piccioto, J.1
-
28
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, and L. Lamport Reaching agreement in the presence of faults, JACM, 27(2), 1980.
-
(1980)
JACM
, vol.27
, Issue.2
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
30
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
ACM
-
T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multiparty Protocols with Honest Majority, STOC 1989, ACM, pp. 73-85.
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|