Secure Distributed Computing in a Commercial Environment
暂无分享,去创建一个
[1] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[2] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[3] Joan Feigenbaum,et al. Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him? , 1985, CRYPTO.
[4] Richard J. Lipton,et al. Towards uncheatable benchmarks , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[5] A. Juels,et al. PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) , 1999 .
[6] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[7] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[8] Manuel Blum,et al. Software reliability via run-time result-checking , 1997, JACM.
[9] Robbert van Renesse,et al. Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.
[10] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[11] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[12] Fritz Hohl. An Approach to Solve the Problem of Malicious Hosts , 1998 .