How to make replicated data secure (1988)

by Maurice P. Herlihy , J. D. Tygar
Venue:Advances in Cryptology - CRYPTO
Citations:45 - 1 self

Documents Related by Co-Citation

11073 Computers and Intractability: A Guide to the Theory of NP-Completeness – M R Garey, D S Johnson - 1979
1813 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
811 Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial – Fred B. Schneider, Fred B. Schneider - 1990
463 Efficient dispersal of information for security, load balancing, and fault tolerance – Michael Rabin - 1989
391 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment – Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - 2002
956 Oceanstore: An architecture for global-scale persistent storage – John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Zhao - 2000
405 Small Byzantine Quorum Systems – Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin - 2001
828 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
675 Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility – Antony Rowstron, Peter Druschel - 2001