Secure Message Transmission in Asynchronous Directed Graphs
暂无分享,去创建一个
[1] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[2] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[3] C. Pandu Rangan,et al. On Communication Complexity of Secure Message Transmission in Directed Networks , 2010, ICDCN.
[4] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] K. Srinathan,et al. Possibility and complexity of probabilistic reliable communication in directed networks , 2006, PODC '06.
[7] K. Srinathan,et al. Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks , 2011, ICITS.
[8] Matthew K. Franklin,et al. Secure hypergraphs: privacy from partial broadcast , 1995, STOC '95.
[9] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[10] Yvo Desmedt,et al. Cryptanalysis of Secure Message Transmission Protocols with Feedback , 2009, ICITS.
[11] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[12] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[13] K. Srinathan,et al. Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary , 2007, DISC.
[14] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[15] K. Srinathan,et al. On perfectly secure communication over arbitrary networks , 2002, PODC '02.
[16] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[17] Ronald Cramer,et al. Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.
[18] Kaoru Kurosawa,et al. Truly efficient 2-round perfectly secure message transmission scheme , 2009, IEEE Trans. Inf. Theory.
[19] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[20] Marcos K. Aguilera,et al. Distributed Computing and Networking , 2011, Lecture Notes in Computer Science.
[21] K. Srinathan,et al. Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT , 2010, DISC.
[22] K. Srinathan,et al. On Proactive Perfectly Secure Message Transmission , 2007, ACISP.
[23] C. Pandu Rangan,et al. Constant phase efficient protocols for secure message transmission in directed networks , 2007, PODC '07.
[24] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[25] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[26] Hosame Abu-Amara,et al. Perfectly secure message transmission in asynchronous networks , 1995, Proceedings.Seventh IEEE Symposium on Parallel and Distributed Processing.
[27] C. Pandu Rangan,et al. Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited , 2008, SCN.
[28] K. Srinathan,et al. Unconditionally reliable message transmission in directed networks , 2008, SODA '08.
[29] Yongge Wang,et al. Robust key establishment in sensor networks , 2004, SGMD.
[30] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[31] K. Srinathan,et al. Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.
[32] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[33] K. Srinathan,et al. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks , 2009, ICDCN.