On the Security of Multi-Party Protocols in Distributed Systems
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Richard M. Karp,et al. On the Security of Ping-Pong Protocols , 1982, Inf. Control..
[4] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[5] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Danny Dolev,et al. Polynomial algorithms for multiple processor agreement , 1982, STOC '82.
[8] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[9] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[10] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[11] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).