-
2
-
-
0033280441
-
The proactive security toolkit and applications
-
to appear in
-
B. Barak, A. Herzberg, D. Naor, E. Shai, "The proactive security toolkit and applications", to appear in the 6th ACM Conference on Computer and Communications Security, 1999.
-
(1999)
The 6th ACM Conference on Computer and Communications Security
-
-
Barak, B.1
Herzberg, A.2
Naor, D.3
Shai, E.4
-
4
-
-
0141911507
-
Multiplicative non-abelian sharing schemes and their application to threshold cryptography
-
Y. Desmedt, G. Di Crescenzo, M. Burmester, "Multiplicative non-abelian sharing schemes and their application to threshold cryptography", Proceedings ASIACRYPT '94, pp. 21-32.
-
Proceedings ASIACRYPT '94
, pp. 21-32
-
-
Desmedt, Y.1
Di Crescenzo, G.2
Burmester, M.3
-
5
-
-
0026155432
-
Intrusion tolerance in distributed computing systems
-
Oakland
-
Y. Deswarte, L. Blain, J Fabre, "Intrusion tolerance in distributed computing systems", Proceedings IEEE Symposium on Security and Privacy, Oakland, 1991, pp. 110-121.
-
(1991)
Proceedings IEEE Symposium on Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.3
-
6
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Y. Frankel, "A practical protocol for large group oriented networks", Eurocrypt 89, pp. 56-61.
-
Eurocrypt
, vol.89
, pp. 56-61
-
-
Frankel, Y.1
-
7
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
Y. Frankel, P. Gemmel, P. MacKenzie, M. Yung, "Optimal-resilience proactive public-key cryptosystems", Proceedings FOCS '97, pp. 384¬ 393.
-
Proceedings FOCS '97
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
MacKenzie, P.3
Yung, M.4
-
8
-
-
0022564904
-
Intrusion tolerance using fine-grain fragmentation-scattering
-
Oakland
-
J. Fray, Y. Deswarte, D. Powell, "Intrusion tolerance using fine-grain fragmentation-scattering", Proceedings IEEE Symposium on Security and Privacy, Oakland, 1986, pp. 194-201.
-
(1986)
Proceedings IEEE Symposium on Security and Privacy
, pp. 194-201
-
-
Fray, J.1
Deswarte, Y.2
Powell, D.3
-
9
-
-
0011000478
-
An introduction to threshold cryptography
-
P. Gemmel, "An introduction to threshold cryptography", in CryptoBytes, a technical newsletter of RSA Laboratories, Vol. 2, No. 7, 1997.
-
(1997)
CryptoBytes, A Technical Newsletter of RSA Laboratories
, vol.2
, Issue.7
-
-
Gemmel, P.1
-
11
-
-
85077753331
-
-
Public Key Cryptography Standards (PKCS), RSA Labs, available at http://www.rsa.com/rsalabs/pubs/PKCS/
-
RSA Labs
-
-
-
12
-
-
0029701328
-
The 0 key management service
-
M. Reiter, M. Franklin, J. Lacy, R. Wright, "The 0 key management service", Proceedings of the 3rd ACM conference on Computer and Communication Security, 1996.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communication Security
-
-
Reiter, M.1
Franklin, M.2
Lacy, J.3
Wright, R.4
-
13
-
-
0342779118
-
A simplified approach to threshold and proactive RSA
-
T. Rabin, "A simplified approach to threshold and proactive RSA", Proceedings of Crypto' 98.
-
Proceedings of Crypto' 98
-
-
Rabin, T.1
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret", Comm. of the ACM, Vol. 22, 1979, pp. 612-613.
-
(1979)
Comm. Of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|