A Statistical Study for File System Meta Data On High Performance Computing Sites Submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Networking
暂无分享,去创建一个
[1] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Paul V. Mockapetris,et al. Development of the domain name system , 1988, SIGCOMM '88.
[3] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[4] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[7] John Linn,et al. Privacy enhancement for Internet electronic mail: Part II - certificate-based key management , 1987, RFC.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[11] Sam Toueg,et al. Randomized Byzantine Agreements , 1984, PODC '84.
[12] Gary E. Weir,et al. The Department of Energy , 1989 .
[13] Sam Toueg,et al. Resilient consensus protocols , 1983, PODC '83.
[14] Steven H. Low,et al. Anonymous Internet Mercantile Protocol , 1994 .
[15] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[16] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[17] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[20] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.
[21] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[22] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[23] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[24] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.
[25] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[26] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[27] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[28] David Chaum,et al. Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms , 1985, EUROCRYPT.