How to make replicated data secure (1988)

by Maurice P. Herlihy , J. D. Tygar
Venue:Advances in Cryptology - CRYPTO
Citations:44 - 1 self

Active Bibliography

82 Dyad: A System for Using Physically Secure Coprocessors – J. D. Tygar, Bennet Yee - 1991
150 Using Secure Coprocessors – Bennet Yee - 1994
1 Cryptology – Prof Ronald Rivest, L. Rivest
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997
28 Randomness, Interactive Proofs and . . . – Oded Goldreich - 1987
217 Building Secure and Reliable Network Applications – Kenneth Birman - 1996
1 Disconnected Operation in the Pesto Storage System – Feike W. Dillema - 2005
10 Strongbox: A System for Self-Securing Programs – J. D. Tygar, Bennet S. Yee - 1991
41 Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions – Moni Naor , Omer Reingold - 1995
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
28 Security and privacy for partial order time – S. W. Smith, J. D. Tygar - 1994
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
Crypto Topics and . . . – Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Rei Safavi-Naini
24 How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract) – Oded Goldreich, Silvio Micali, Avi Wigderson - 1998
Enhancements of Trapdoor Permutations – Oded Goldreich, Ron D. Rothblum - 2012
15 Secure Distributed Time for Secure Distributed Protocols – Sean W. Smith, Maurice Herlihy - 1994
1 Design, Analysis and Applications of Cryptographic Techniques – Royal Holloway, Chan Yeob Yeun, Chan Yeob Yeun - 2001
11 Proactive Obfuscation – Tom Roeder, Fred B. Schneider