Stabilization, Safety, and Security of Distributed Systems: 22nd International Symposium, SSS 2020, Austin, TX, USA, November 18–21, 2020, Proceedings

[1]  Till Knollmann,et al.  A Discrete and Continuous Study of the Max-Chain-Formation Problem , 2022, Information and Computation.

[2]  Anisur Rahaman Molla,et al.  Dispersion of Mobile Robots , 2022, ICDCN.

[3]  Michel Raynal,et al.  Leader Election in Arbitrarily Connected Networks with Process Crashes and Weak Channel Reliability , 2021, Networked Systems.

[4]  Kazumasa Shinagawa,et al.  Card-Based ZKP Protocols for Takuzu and Juosan , 2021, FUN.

[5]  Toshimitsu Masuzawa,et al.  Time-optimal Loosely-stabilizing Leader Election in Population Protocols , 2020, ArXiv.

[6]  Suthee Ruangwises,et al.  Physical Zero-Knowledge Proof for Numberlink , 2021, FUN.

[7]  Introduction to local certification , 2019, Discrete Mathematics & Theoretical Computer Science.

[8]  Chuan Xu,et al.  Time-Optimal Self-Stabilizing Leader Election in Population Protocols , 2019, PODC.

[9]  Arpita Patra,et al.  On the Exact Round Complexity of Secure Three-Party Computation , 2018, Journal of Cryptology.

[10]  Petr Kuznetsov,et al.  Affine Tasks for k-Test-and-Set , 2020, SSS.

[11]  A Combinatorial Characterization of Self-Stabilizing Population Protocols , 2020, SSS.

[12]  Yefim Dinitz,et al.  Local Deal-Agreement Based Monotonic Distributed Algorithms for Load Balancing in General Graphs , 2020, ArXiv.

[13]  Christoph Lenzen,et al.  TRIX: Low-Skew Pulse Propagation for Fault-Tolerant Hardware , 2020, ArXiv.

[14]  Carole Delporte-Gallet,et al.  t-Resilient k-Immediate Snapshot and its Relation with Agreement Problems , 2020, ArXiv.

[15]  Axel Legay,et al.  Formalising fault injection and countermeasures , 2020, ARES.

[16]  Fadi Al-Turjman,et al.  A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure , 2020, Mobile Networks and Applications.

[17]  Ho-Lin Chen,et al.  Self-Stabilizing Leader Election in Regular Graphs , 2020, PODC.

[18]  Friedhelm Meyer auf der Heide,et al.  A Discrete and Continuous Study of the Max-Chain-Formation Problem , 2020, SSS.

[19]  Fukuhito Ooshita,et al.  Move-optimal partial gathering of mobile agents without identifiers or global knowledge in asynchronous unidirectional rings , 2020, Theor. Comput. Sci..

[20]  Axel Legay,et al.  Combined software and hardware fault injection vulnerability detection , 2020, Innovations in Systems and Software Engineering.

[21]  Tatsuya Sasaki,et al.  Efficient card-based zero-knowledge proof for Sudoku , 2020, Theor. Comput. Sci..

[22]  Songtao Guo,et al.  G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications , 2020, 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[23]  H. Attiya,et al.  Store-Collect in the Presence of Continuous Churn with Application to Snapshots and Lattice Agreement , 2020, SSS.

[24]  Toshimitsu Masuzawa,et al.  The Power of Global Knowledge on Self-stabilizing Population Protocols , 2020, SIROCCO.

[25]  Kim Yonghwan,et al.  Uniform Deployment of Mobile Agents in Dynamic Rings , 2020, SSS.

[26]  Avrim Blum,et al.  Foundations of Data Science , 2020 .

[27]  Soumyottam Chatterjee,et al.  Distributed MST: A Smoothed Analysis , 2020, ICDCN.

[28]  Ajay D. Kshemkalyani,et al.  Dispersion of Mobile Robots in the Global Communication Model , 2019, ICDCN.

[29]  L. Blin,et al.  Silent MST approximation for tiny memory , 2019, SSS.

[30]  Jukka Suomela,et al.  How much does randomness help with locally checkable problems? , 2019, PODC.

[31]  Yuval Emek,et al.  Twenty-Two New Approximate Proof Labeling Schemes , 2020, DISC.

[32]  Sébastien Tixeuil,et al.  Boosting the Efficiency of Byzantine-Tolerant Reliable Communication , 2020, SSS.

[33]  Friedhelm Meyer auf der Heide,et al.  Brief Announcement: Gathering in Linear Time: A Closed Chain of Disoriented and Luminous Robots with Limited Visibility , 2020, SSS.

[34]  Anisur Rahaman Molla,et al.  Smoothed Analysis of Leader Election in Distributed Networks , 2020, SSS.

[35]  Axel Legay,et al.  Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software , 2020, SSS.

[36]  Petr Kuznetsov,et al.  Brief Announcement: On Decidability of 2-Process Affine Models , 2020, DISC.

[37]  S. Dolev,et al.  Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse For QKD Resilient Against Weak Measurements and Securing Entanglement , 2020 .

[38]  Tatsuya Sasaki,et al.  A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation , 2019, ISPEC.

[39]  Leader Election in the Internet of Things: Challenges and Opportunities , 2019, ArXiv.

[40]  Laurent Feuilloley,et al.  Brief Announcement: Memory Lower Bounds for Self-Stabilization , 2019, DISC.

[41]  Petr Kuznetsov,et al.  Reconfigurable Lattice Agreement and Applications , 2019, OPODIS.

[42]  Shashank Srivastava,et al.  NBP: Namespace-based privacy to counter timing-based attack in named data networking , 2019, J. Netw. Comput. Appl..

[43]  Laurent Feuilloley Note on distributed certification of minimum spanning trees , 2019, ArXiv.

[44]  Ajay D. Kshemkalyani,et al.  Fast Dispersion of Mobile Robots on Arbitrary Graphs , 2019, ALGOSENSORS.

[45]  Tatsuya Sasaki,et al.  Card-Based Physical Zero-Knowledge Proof for Kakuro , 2019, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[46]  Ivan Damgård,et al.  Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing , 2019, IACR Cryptol. ePrint Arch..

[47]  Tatsuya Sasaki,et al.  Interactive Physical Zero-Knowledge Proof for Norinori , 2019, COCOON.

[48]  Ho-Lin Chen,et al.  Self-Stabilizing Leader Election , 2019, PODC.

[49]  Sergio Rajsbaum,et al.  An Eventually Perfect Failure Detector for Networks of Arbitrary Topology Connected with ADD Channels Using Time-To-Live Values , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[50]  Fukuhito Ooshita,et al.  Loosely-Stabilizing Leader Election for Arbitrary Graphs in Population Protocol Model , 2019, IEEE Transactions on Parallel and Distributed Systems.

[51]  Feng Wu,et al.  A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.

[52]  Saptaparni Kumar,et al.  Implementing ♢P with Bounded Messages on a Network of ADD Channels , 2019, Parallel Process. Lett..

[53]  Franck Petit,et al.  Introduction to Distributed Self-Stabilizing Algorithms , 2019, Introduction to Distributed Self-Stabilizing Algorithms.

[54]  Nitin H. Vaidya,et al.  Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model , 2019, PODC.

[55]  Sébastien Tixeuil,et al.  Multi-hop Byzantine reliable broadcast with honest dealer made practical , 2019, Journal of the Brazilian Computer Society.

[56]  Fukuhito Ooshita,et al.  Partial Gathering of Mobile Agents in Arbitrary Networks , 2019, IEICE Trans. Inf. Syst..

[57]  Mauro Conti,et al.  Privacy-Aware Caching in Information-Centric Networking , 2019, IEEE Transactions on Dependable and Secure Computing.

[58]  M. Lewenstein,et al.  Quantum Entanglement , 2020, Quantum Mechanics.

[59]  Stéphane Devismes,et al.  Self-Stabilizing Distributed Cooperative Reset , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[60]  Pavan Poudel,et al.  Time-optimal uniform scattering in a grid , 2019, ICDCN.

[61]  Vijay K. Garg,et al.  Linearizable Replicated State Machines with Lattice Agreement , 2018, OPODIS 2018.

[62]  Christian Scheideler,et al.  Forming tile shapes with simple robots , 2018, Natural Computing.

[63]  Giuseppe Antonio Di Luna,et al.  Patrolling on Dynamic Ring Networks , 2019, SOFSEM.

[64]  Tim Roughgarden,et al.  Beyond worst-case analysis , 2018, Commun. ACM.

[65]  Ajay D. Kshemkalyani,et al.  Efficient dispersion of mobile robots on graphs , 2018, ICDCN.

[66]  Axel Legay,et al.  An automated and scalable formal process for detecting fault injection vulnerabilities in binaries , 2019, Concurr. Comput. Pract. Exp..

[67]  Shlomi Dolev,et al.  Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets , 2019, IACR Cryptol. ePrint Arch..

[68]  Leslie Lamport,et al.  The mutual exclusion problem: part II - Statement and solutions , 2019, Concurrency: the Works of Leslie Lamport.

[69]  Shlomi Dolev,et al.  Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract) , 2019, IACR Cryptol. ePrint Arch..

[70]  Alfredo Navarra,et al.  Asynchronous Robots on Graphs: Gathering , 2019, Distributed Computing by Mobile Entities.

[71]  Giovanni Viglietta,et al.  Robots with Lights , 2019, Distributed Computing by Mobile Entities.

[72]  Friedhelm Meyer auf der Heide,et al.  Continuous Protocols for Swarm Robotics , 2019, Distributed Computing by Mobile Entities.

[73]  Fukuhito Ooshita,et al.  Loosely-Stabilizing Leader Election with Polylogarithmic Convergence Time , 2018, OPODIS.

[74]  Craig Gentry,et al.  Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free , 2019, IACR Cryptol. ePrint Arch..

[75]  Geoffroy Couteau A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model , 2018, IACR Cryptol. ePrint Arch..

[76]  Moni Naor,et al.  The Power of Distributed Verifiers in Interactive Proofs , 2018, Electron. Colloquium Comput. Complex..

[77]  Michel Raynal,et al.  Unifying Concurrent Objects and Distributed Tasks , 2018, J. ACM.

[78]  Tatsuya Sasaki,et al.  Physical Zero-Knowledge Proof for Makaro , 2018, SSS.

[79]  Mariana Raykova,et al.  RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.

[80]  Axel Legay,et al.  The State of Fault Injection Vulnerability Detection , 2018, VECoS.

[81]  Mario Gerla,et al.  Betweenness centrality and cache privacy in information-centric networks , 2018, ICN.

[82]  Michel Raynal,et al.  Fault-Tolerant Message-Passing Distributed Systems , 2018, Springer International Publishing.

[83]  Giuseppe Antonio Di Luna,et al.  Distributed exploration of dynamic rings , 2018, Distributed Computing.

[84]  Xin Wang,et al.  Distributed Line Formation Control in Swarm Robots , 2018, 2018 IEEE International Conference on Information and Automation (ICIA).

[85]  Maria Gradinariu Potop-Butucaru,et al.  On time complexity for connectivity-preserving scattering of mobile robots , 2018, Theor. Comput. Sci..

[86]  Vijay K. Garg,et al.  Lattice Agreement in Message Passing Systems , 2018, DISC.

[87]  Peter Robinson,et al.  Leader Election in Well-Connected Graphs , 2018, PODC.

[88]  Petr Kuznetsov,et al.  An Asynchronous Computability Theorem for Fair Adversaries , 2018, PODC.

[89]  John Augustine,et al.  Sublinear Message Bounds for Randomized Agreement , 2018, PODC.

[90]  Fukuhito Ooshita,et al.  Group Exploration of Dynamic Tori , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[91]  Shlomi Dolev,et al.  One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract) , 2018, CSCML.

[92]  Gene Tsudik,et al.  Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest , 2018, 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).

[93]  Fucai Zhou,et al.  Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..

[94]  Rafail Ostrovsky,et al.  Population Stability: Regulating Size in the Presence of an Adversary , 2018, PODC.

[95]  Sébastien Tixeuil,et al.  Synchronous Gathering without Multiplicity Detection: a Certified Algorithm , 2017, Theory of Computing Systems.

[96]  Leonid Barenboim,et al.  Locally-Iterative Distributed (Δ+ 1): -Coloring below Szegedy-Vishwanathan Barrier, and Applications to Self-Stabilization and to Restricted-Bandwidth Models , 2017, PODC.

[97]  Alysson Bessani,et al.  A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2017, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[98]  Xavier Défago,et al.  Optimally Gathering Two Robots , 2018, ICDCN.

[99]  John Augustine,et al.  Deterministic Dispersion of Mobile Robots in Dynamic Rings , 2017, ICDCN.

[100]  John Augustine,et al.  Dispersion of Mobile Robots: A Study of Memory-Time Trade-offs , 2017, International Conference of Distributed Computing and Networking.

[101]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..

[102]  Carole Delporte-Gallet,et al.  Implementing Snapshot Objects on Top of Crash-Prone Asynchronous Message-Passing Systems , 2018, IEEE Transactions on Parallel and Distributed Systems.

[103]  Chuzo Iwamoto,et al.  Herugolf and Makaro are NP-complete , 2018, FUN.

[104]  Sébastien Tixeuil,et al.  Compact deterministic self-stabilizing leader election on a ring: the exponential advantage of being talkative , 2017, Distributed Computing.

[105]  Veysel Gazi,et al.  Distributed sensor deployment using potential fields , 2017, Ad Hoc Networks.

[106]  Gennaro Cordasco,et al.  Space-Optimal Proportion Consensus with Population Protocols , 2017, SSS.

[107]  Hirotsugu Kakugawa,et al.  Brief Announcement: Space-Efficient Uniform Deployment of Mobile Agents in Asynchronous Unidirectional Rings , 2017, SSS.

[108]  Pavan Poudel,et al.  Universally Optimal Gathering Under Limited Visibility , 2017, SSS.

[109]  Gene Tsudik,et al.  When encryption is not enough: privacy attacks in content-centric networking , 2017, ICN.

[110]  Ivan Damgård,et al.  The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited , 2017, CRYPTO.

[111]  Yoshiaki Katayama,et al.  Brief Announcement: Optimal Asynchronous Rendezvous for Mobile Robots with Lights , 2017, SSS.

[112]  Ami Paz,et al.  Approximate Proof-Labeling Schemes , 2017, SIROCCO.

[113]  Christoph Lenzen,et al.  Self-Stabilising Byzantine Clock Synchronisation Is Almost as Easy as Consensus , 2017, DISC.

[114]  Nicola Santoro,et al.  Gathering in Dynamic Rings , 2017, SIROCCO.

[115]  Friedhelm Meyer auf der Heide,et al.  Gathering Anonymous, Oblivious Robots on a Grid , 2017, ALGOSENSORS.

[116]  Petr Kuznetsov,et al.  Agreement Functions for Distributed Computing Models , 2017, NETYS.

[117]  Yuval Peres,et al.  Local max-cut in smoothed polynomial time , 2017, STOC.

[118]  Michael Dinitz,et al.  Smoothed Analysis of Dynamic Networks , 2015, DISC.

[119]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[120]  Petr Kuznetsov,et al.  Read-Write Memory and k-Set Consensus as an Affine Task , 2016, OPODIS.

[121]  Zvika Brakerski,et al.  Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.

[122]  Michel Raynal,et al.  Implementing set objects in dynamic distributed systems , 2016, J. Comput. Syst. Sci..

[123]  Fukuhito Ooshita,et al.  Uniform Deployment of Mobile Agents in Asynchronous Rings , 2016, PODC.

[124]  Carole Delporte-Gallet,et al.  t-Resilient Immediate Snapshot Is Impossible , 2016, SIROCCO.

[125]  George Pavlou,et al.  Efficient Hash-routing and Domain Clustering Techniques for Information-Centric Networks , 2016, Comput. Networks.

[126]  Ajoy Kumar Datta,et al.  The Same Speed Timer in Population Protocols , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[127]  Jean-Guillaume Dumas,et al.  Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen , 2016, FUN.

[128]  Pierre Fraigniaud,et al.  Survey of Distributed Decision , 2016, Bull. EATCS.

[129]  Sylvain Clerc,et al.  Investigating the single-event-transient sensitivity of 65 nm clock trees with heavy ion irradiation and Monte-Carlo simulation , 2016, 2016 IEEE International Reliability Physics Symposium (IRPS).

[130]  B. L. Bhuva,et al.  Single-Event Transient Sensitivity Evaluation of Clock Networks at 28-nm CMOS Technology , 2016, IEEE Transactions on Nuclear Science.

[131]  Friedhelm Meyer auf der Heide,et al.  Asymptotically Optimal Gathering on a Grid , 2016, SPAA.

[132]  Nicola Santoro,et al.  Autonomous mobile robots with lights , 2016, Theor. Comput. Sci..

[133]  Friedhelm Meyer auf der Heide,et al.  Gathering a Closed Chain of Robots on a Grid , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[134]  Fukuhito Ooshita,et al.  Partial gathering of mobile agents in asynchronous unidirectional rings , 2016, Theor. Comput. Sci..

[135]  Nicola Santoro,et al.  Distributed computing by mobile robots: uniform circle formation , 2014, Distributed Computing.

[136]  Paul G. Spirakis,et al.  Determining majority in networks with local interactions and very small local memory , 2014, Distributed Computing.

[137]  Matthias Függer,et al.  HEX: scaling honeycombs is easier than scaling clock trees , 2013, J. Comput. Syst. Sci..

[138]  Xavier Défago,et al.  Fault and Byzantine Tolerant Self-stabilizing Mobile Robots Gathering - Feasibility Study - , 2016, ArXiv.

[139]  Idit Keidar,et al.  Dynamic Atomic Snapshots , 2016, OPODIS.

[140]  Gene Tsudik,et al.  AC3N: Anonymous communication in Content-Centric Networking , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[141]  Aziz Mohaisen,et al.  Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures , 2015, IEEE Transactions on Dependable and Secure Computing.

[142]  Eli Gafni,et al.  Elastic Configuration Maintenance via a Parsimonious Speculating Snapshot Solution , 2015, DISC.

[143]  Hein Meling,et al.  SmartMerge: A New Approach to Reconfiguration for Atomic Storage , 2015, DISC.

[144]  Fukuhito Ooshita,et al.  A Single Agent Exploration in Unknown Undirected Graphs with Whiteboards , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[145]  Takaaki Mizuki,et al.  Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points , 2015, UCNC.

[146]  Gokarna Sharma,et al.  Tight Bounds on Localized Sensor Self-Deployment for Focused Coverage , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[147]  Taisuke Izumi On Space and Time Complexity of Loosely-Stabilizing Leader Election , 2015, SIROCCO.

[148]  Sébastien Tixeuil,et al.  Wait-Free Gathering Without Chirality , 2015, SIROCCO.

[149]  Pierre Fraigniaud,et al.  Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[150]  Lélia Blin,et al.  A Self-Stabilizing Memory Efficient Algorithm for the Minimum Diameter Spanning Tree under an Omnipotent Daemon , 2015, 2015 IEEE International Parallel and Distributed Processing Symposium.

[151]  Friedhelm Meyer auf der Heide,et al.  Linear and Competitive Strategies for Continuous Robot Formation Problems , 2015, ACM Trans. Parallel Comput..

[152]  Nahid Farhady Ghalaty,et al.  Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers , 2015, COSADE.

[153]  Sruti Gan Chaudhuri,et al.  Fault-tolerant gathering of asynchronous oblivious mobile robots under one-axis agreement , 2015, J. Discrete Algorithms.

[154]  Sébastien Tixeuil,et al.  Containing Byzantine Failures with Control Zones , 2015, IEEE Transactions on Parallel and Distributed Systems.

[155]  Sébastien Tixeuil,et al.  Impossibility of gathering, a certification , 2015, Inf. Process. Lett..

[156]  Shay Kutten,et al.  Sublinear bounds for randomized leader election , 2012, Theor. Comput. Sci..

[157]  Shlomi Dolev,et al.  Towards efficient private distributed computation on unbounded input streams , 2012, J. Math. Cryptol..

[158]  Heiko Röglin,et al.  Smoothed Analysis of Local Search for the Maximum-Cut Problem , 2017, ACM Trans. Algorithms.

[159]  Fukuhito Ooshita,et al.  Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers , 2020, OPODIS.

[160]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[161]  Tomoko Izumi,et al.  Space-efficient self-stabilizing counting population protocols on mobile sensor networks , 2014, Theor. Comput. Sci..

[162]  Boaz Patt-Shamir,et al.  On Proof-Labeling Schemes versus Silent Self-stabilizing Algorithms , 2014, SSS.

[163]  Karine Heydemann,et al.  Software Countermeasures for Control Flow Integrity of Smart Card C Codes , 2014, ESORICS.

[164]  Sébastien Tixeuil,et al.  Byzantine broadcast with fixed disjoint paths , 2014, J. Parallel Distributed Comput..

[165]  Fukuhito Ooshita,et al.  Move-optimal partial gathering of mobile agents in asynchronous trees , 2014, Theor. Comput. Sci..

[166]  Fernanda Gusmão de Lima Kastensmidt,et al.  SET Susceptibility Analysis of Clock Tree and Clock Mesh Topologies , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.

[167]  Li Yu,et al.  Limitations on information theoretically secure quantum homomorphic encryption , 2014, ArXiv.

[168]  Faith Ellen,et al.  Impossibility Results for Distributed Computing , 2014, Impossibility Results for Distributed Computing.

[169]  George Pavlou,et al.  Icarus: a caching simulator for information centric networking (ICN) , 2014, SimuTools.

[170]  Petr Kuznetsov,et al.  Strong Equivalence Relations for Iterated Models , 2014, OPODIS.

[171]  Petr Kuznetsov,et al.  A generalized asynchronous computability theorem , 2013, PODC.

[172]  Joffroy Beauquier,et al.  Self-stabilizing Leader Election in Population Protocols over Arbitrary Communication Graphs , 2013, OPODIS.

[173]  Miguel Correia,et al.  Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[174]  Maurice Herlihy,et al.  Distributed Computing Through Combinatorial Topology , 2013 .

[175]  Michel Raynal,et al.  Power and limits of distributed computing shared memory models , 2013, Theor. Comput. Sci..

[176]  Sriram K. Rajamani,et al.  Asynchronous Resilient Linearizability , 2013, DISC.

[177]  Nicola Santoro,et al.  Uniform Dispersal of Asynchronous Finite-State Mobile Robots in Presence of Holes , 2013, ALGOSENSORS.

[178]  George Pavlou,et al.  Hash-routing schemes for information centric networking , 2013, ICN '13.

[179]  Shay Kutten,et al.  On the Complexity of Universal Leader Election , 2015, J. ACM.

[180]  Sébastien Tixeuil,et al.  Gathering of Mobile Robots Tolerating Multiple Crash Faults , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[181]  Sayaka Kamei,et al.  Time-Optimal Gathering Algorithm of Mobile Robots with Local Weak Multiplicity Detection in Rings , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[182]  George Pavlou,et al.  Cache "less for more" in information-centric networks (extended version) , 2013, Comput. Commun..

[183]  Sayaka Kamei,et al.  Feasibility of Polynomial-Time Randomized Gathering for Oblivious Mobile Robots , 2013, IEEE Transactions on Parallel and Distributed Systems.

[184]  Anat Paskin-Cherniavsky,et al.  On the Power of Correlated Randomness in Secure Computation , 2013, TCC.

[185]  Giovanni Viglietta Rendezvous of Two Robots with Visible Bits , 2013, ALGOSENSORS.

[186]  Shlomi Dolev,et al.  Self-stabilizing Byzantine Resilient Topology Discovery and Message Delivery - (Extended Abstract) , 2012, NETYS.

[187]  Zhiyun Lin,et al.  An incremental deployment algorithm for wireless sensor networks using one or multiple autonomous agents , 2013, Ad Hoc Networks.

[188]  Aziz Mohaisen,et al.  Protecting access privacy of cached contents in information centric networks , 2013, ASIA CCS '13.

[189]  V. Climenhaga Markov chains and mixing times , 2013 .

[190]  Sébastien Tixeuil,et al.  On the self-stabilization of mobile oblivious robots in uniform rings , 2015, Theor. Comput. Sci..

[191]  Nicola Santoro,et al.  Distributed Computing by Oblivious Mobile Robots , 2012, Synthesis Lectures on Distributed Computing Theory.

[192]  George Pavlou,et al.  Probabilistic in-network caching for information-centric networks , 2012, ICN '12.

[193]  Maurice Herlihy,et al.  Simulations and reductions for colorless tasks , 2012, PODC '12.

[194]  Sriram K. Rajamani,et al.  Generalized lattice agreement , 2012, PODC '12.

[195]  Yukiko Yamauchi,et al.  Loosely-stabilizing leader election in a population protocol model , 2012, Theor. Comput. Sci..

[196]  Friedhelm Meyer auf der Heide,et al.  Optimal and competitive runtime bounds for continuous, local gathering of mobile robots , 2012, SPAA '12.

[197]  Sébastien Tixeuil,et al.  Gathering an Even Number of Robots in an Odd Ring without Global Multiplicity Detection , 2012, MFCS.

[198]  Franck Petit,et al.  Self-stabilizing gathering with strong multiplicity detection , 2012, Theor. Comput. Sci..

[199]  Ron Steinfeld,et al.  Multi-party computation with conversion of secret sharing , 2012, Des. Codes Cryptogr..

[200]  Ashwin Machanavajjhala,et al.  Publishing Search Logs—A Comparative Study of Privacy Guarantees , 2012, IEEE Transactions on Knowledge and Data Engineering.

[201]  Lewis Tseng,et al.  Iterative approximate byzantine consensus in arbitrary directed graphs , 2012, PODC '12.

[202]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[203]  Gene Tsudik,et al.  ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.

[204]  Xavier Défago,et al.  The Gathering Problem for Two Oblivious Robots with Unreliable Compasses , 2012, SIAM J. Comput..

[205]  Dmitry N. Kozlov,et al.  Chromatic subdivision of a simplicial complex , 2012 .

[206]  Christophe Giraud,et al.  Dynamic Fault Injection Countermeasure , 2012 .

[207]  Michel Raynal,et al.  Implementing a Regular Register in an Eventually Synchronous Distributed System Prone to Continuous Churn , 2012, IEEE Transactions on Parallel and Distributed Systems.

[208]  Craig Gentry,et al.  Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.

[209]  Koichi Wada,et al.  How to Prove Impossibility Under Global Fairness: On Space Complexity of Self-Stabilizing Leader Election on a Population Protocol Model , 2012, Theory of Computing Systems.

[210]  Ivan Damgård,et al.  Secure Two-Party Computation with Low Communication , 2012, IACR Cryptol. ePrint Arch..

[211]  Kun Peng Threshold distributed access control with public verification: a practical application of PVSS , 2011, International Journal of Information Security.

[212]  Kun Peng,et al.  Efficient VSS free of computational assumption , 2011, J. Parallel Distributed Comput..

[213]  Jennifer L. Welch,et al.  Link Reversal Algorithms , 2011, Synthesis Lectures on Distributed Computing Theory.

[214]  Ajoy Kumar Datta,et al.  An O(n)-time self-stabilizing leader election algorithm , 2011, J. Parallel Distributed Comput..

[215]  Sébastien Tixeuil,et al.  A Taxonomy of Daemons in Self-stabilization , 2011, ArXiv.

[216]  Bodo Manthey,et al.  Smoothed Analysis of the k-Means Method , 2011, JACM.

[217]  Matthew Roughan,et al.  The Internet Topology Zoo , 2011, IEEE Journal on Selected Areas in Communications.

[218]  Alexandre Viejo,et al.  Multi-party Private Web Search with Untrusted Partners , 2011, SecureComm.

[219]  Ricardo Reis,et al.  SET susceptibility analysis in buffered tree clock distribution networks , 2011, 2011 12th European Conference on Radiation and Its Effects on Components and Systems.

[220]  Friedhelm Meyer auf der Heide,et al.  Convergence of local communication chain strategies via linear transformations: or how to trade locality for speed , 2011, SPAA '11.

[221]  Friedhelm Meyer auf der Heide,et al.  A tight runtime bound for synchronous gathering of autonomous robots with limited visibility , 2011, SPAA '11.

[222]  Christoph Lenzen,et al.  Fault-tolerant algorithms for tick-generation in asynchronous logic , 2011, SSS.

[223]  Sébastien Tixeuil,et al.  Asynchronous Mobile Robot Gathering from Symmetric Configurations without Global Multiplicity Detection , 2011, SIROCCO.

[224]  Alfred M. Bruckstein,et al.  Uniform multi-agent deployment on a ring , 2011, Theor. Comput. Sci..

[225]  Rachid Guerraoui,et al.  Introduction to Reliable and Secure Distributed Programming , 2011 .

[226]  David Peleg,et al.  Distributed verification and hardness of distributed approximation , 2010, STOC '11.

[227]  Robert Elsässer,et al.  Settling the Complexity of Local Max-Cut (Almost) Completely , 2010, ICALP.

[228]  Rachid Guerraoui,et al.  The disagreement power of an adversary , 2011, Distributed Computing.

[229]  Eli Gafni,et al.  Distributed Programming with Tasks , 2010, OPODIS.

[230]  Pekka Nikander,et al.  Developing Information Networking Further: From PSIRP to PURSUIT , 2010, BROADNETS.

[231]  Nancy A. Lynch,et al.  Rambo: a robust, reconfigurable atomic memory service for dynamic networks , 2010, Distributed Computing.

[232]  Shay Kutten,et al.  Low Communication Self-stabilization through Randomization , 2010, DISC.

[233]  Alfredo Navarra,et al.  Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring , 2010, Theor. Comput. Sci..

[234]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[235]  Euripides Markou,et al.  The Mobile Agent Rendezvous Problem in the Ring , 2010, Synthesis Lectures on Distributed Computing Theory.

[236]  Sergio Rajsbaum,et al.  Iterated Shared Memory Models , 2010, LATIN.

[237]  Xavier Défago,et al.  The cost of probabilistic agreement in oblivious robot networks , 2010, Inf. Process. Lett..

[238]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[239]  Kun Peng,et al.  Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy , 2009, WISA.

[240]  Shay Kutten,et al.  Making Population Protocols Self-stabilizing , 2009, SSS.

[241]  Marcos K. Aguilera,et al.  Dynamic atomic storage without consensus , 2009, PODC '09.

[242]  Friedhelm Meyer auf der Heide,et al.  Optimal strategies for maintaining a chain of relays between an explorer and a base camp , 2009, Theor. Comput. Sci..

[243]  Alex Wright,et al.  Contemporary approaches to fault tolerance , 2009, CACM.

[244]  Anne-Marie Kermarrec,et al.  Implementing a Register in a Dynamic Distributed System , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[245]  Lali Barrière,et al.  Uniform scattering of autonomous mobile robots in a grid , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[246]  Franck Petit,et al.  Self-stabilizing Deterministic Gathering , 2009, ALGOSENSORS.

[247]  Jehoshua Bruck,et al.  Programmability of Chemical Reaction Networks , 2009, Algorithmic Bioprocesses.

[248]  Nicola Santoro,et al.  Arbitrary pattern formation by asynchronous, anonymous, oblivious robots , 2008, Theor. Comput. Sci..

[249]  Dahlia Malkhi,et al.  Efficient distributed approximation algorithms via probabilistic tree embeddings , 2008, PODC '08.

[250]  Nicola Santoro,et al.  Self-deployment of mobile sensors on a ring , 2008, Theor. Comput. Sci..

[251]  Reuven Cohen,et al.  Local spreading algorithms for autonomous robot systems , 2008, Theor. Comput. Sci..

[252]  Xavier Défago,et al.  Non-uniform circle formation algorithm for oblivious mobile robots with convergence toward uniformity , 2008, Theor. Comput. Sci..

[253]  Ashwin Machanavajjhala,et al.  Privacy: Theory meets Practice on the Map , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[254]  Moni Naor,et al.  Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles , 2008, Theory of Computing Systems.

[255]  David Eisenstat,et al.  Fast computation by population protocols with a leader , 2006, Distributed Computing.

[256]  Michael J. Fischer,et al.  Self-stabilizing population protocols , 2005, TAAS.

[257]  Michel Raynal,et al.  A Timing Assumption and Two t-Resilient Protocols for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems , 2007, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07).

[258]  Michel Raynal,et al.  Test & Set, Adaptive Renaming and Set Agreement: a Guided Visit to Asynchronous Computability , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[259]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[260]  Srikanth Sastry,et al.  Eventually Perfect Failure Detectors Using ADD Channels , 2007, ISPA.

[261]  Ajoy Kumar Datta,et al.  Snap-stabilization and PIF in tree networks , 2007, Distributed Computing.

[262]  Christian Scheideler,et al.  Linearization: Locally Self-Stabilizing Sorting in Graphs , 2007, ALENEX.

[263]  David Eisenstat,et al.  The computational power of population protocols , 2006, Distributed Computing.

[264]  Sébastien Tixeuil,et al.  Transient fault detectors , 1998, Distributed Computing.

[265]  B. Awerbuch,et al.  Memory-eecient and Self-stabilizing Network Reset , 2007 .

[266]  James Aspnes,et al.  An Introduction to Population Protocols , 2007, Bull. EATCS.

[267]  Michael J. Fischer,et al.  Self-stabilizing Leader Election in Networks of Finite-State Anonymous Agents , 2006, OPODIS.

[268]  Evangelos Kranakis,et al.  An Algorithmic Theory of Mobile Agents , 2006, TGC.

[269]  Xavier Défago,et al.  Fault-Tolerant and Self-stabilizing Mobile Robots Gathering , 2006, DISC.

[270]  Friedhelm Meyer auf der Heide,et al.  Maintaining Communication Between an Explorer and a Base Station , 2006, BICC.

[271]  Shay Kutten,et al.  Distributed verification of minimum spanning trees , 2006, PODC '06.

[272]  Reuven Cohen,et al.  Local Algorithms for Autonomous Robot Systems , 2006, SIROCCO.

[273]  Nikolaos Laoutaris,et al.  The LCD interconnection of LRU caches and its analysis , 2006, Perform. Evaluation.

[274]  Michael K. Reiter,et al.  Fault-scalable Byzantine fault-tolerant services , 2005, SOSP '05.

[275]  Laurence Pilard,et al.  Observing Locally Self-Stabilization in a Probabilistic Way , 2005, J. Aerosp. Comput. Inf. Commun..

[276]  Shay Kutten,et al.  Proof labeling schemes , 2005, PODC '05.

[277]  Nitin H. Vaidya,et al.  On reliable broadcast in a radio network , 2005, PODC '05.

[278]  Nicola Santoro,et al.  Gathering of asynchronous robots with limited visibility , 2005, Theor. Comput. Sci..

[279]  Branislav Katreniak Biangular Circle Formation by Asynchronous Mobile Robots , 2005, SIROCCO.

[280]  A short introduction to failure detectors for asynchronous distributed systems , 2005, SIGA.

[281]  Andrzej Pelc,et al.  Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..

[282]  Ophir Rachman,et al.  Atomic snapshots using lattice agreement , 1995, Distributed Computing.

[283]  Laurence Pilard,et al.  Observing locally self-stabilization , 2005, J. High Speed Networks.

[284]  M. Dahleh Laboratory for Information and Decision Systems , 2005 .

[285]  Pramod K. Varshney,et al.  Energy-efficient deployment of Intelligent Mobile sensor networks , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[286]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[287]  Reuven Cohen,et al.  Convergence Properties of the Gravitational Algorithm in Asynchronous Robot Systems , 2004, SIAM J. Comput..

[288]  Israel A. Wagner,et al.  Gathering Multiple Robotic A(ge)nts with Limited Sensing Capabilities , 2004, ANTS Workshop.

[289]  Michael J. Fischer,et al.  Computation in networks of passively mobile finite-state sensors , 2004, PODC '04.

[290]  Chiu-Yuen Koo,et al.  Broadcast in radio networks tolerating byzantine adversarial behavior , 2004, PODC '04.

[291]  Marcos K. Aguilera,et al.  Communication-efficient leader election and consensus with limited link synchrony , 2004, PODC '04.

[292]  Gaurav S. Sukhatme,et al.  Constrained coverage for mobile sensor networks , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[293]  Marcos K. Aguilera,et al.  A pleasant stroll through the land of infinitely many creatures , 2004, SIGA.

[294]  Fuguo Deng,et al.  Secure direct communication with a quantum one-time pad , 2004, quant-ph/0405177.

[295]  Deborah Estrin,et al.  Self-configuring localization systems: Design and Experimental Evaluation , 2004, TECS.

[296]  Noa Agmon,et al.  Fault-tolerant gathering algorithms for autonomous mobile robots , 2004, SODA '04.

[297]  Shlomi Dolev,et al.  Self Stabilization , 2004, J. Aerosp. Comput. Inf. Commun..

[298]  Jiannong Cao,et al.  Scalable load balancing on distributed web servers using mobile agents , 2003, J. Parallel Distributed Comput..

[299]  Hoa G. Nguyen,et al.  Autonomous Communication Relays for Tactical Robots , 2003 .

[300]  Maurice Herlihy,et al.  Obstruction-free synchronization: double-ended queues as an example , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[301]  M. Kaufmann What Can Be Computed Locally ? , 2003 .

[302]  Esther M. Arkin,et al.  Algorithms for Rapidly Dispersing Robot Swarms in Unknown Environments , 2002, WAFR.

[303]  Miguel Castro,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.

[304]  Anna Lysyanskaya,et al.  Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.

[305]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[306]  Gaurav S. Sukhatme,et al.  An Incremental Self-Deployment Algorithm for Mobile Sensor Networks , 2002, Auton. Robots.

[307]  George Cybenko,et al.  D'Agents: Applications and performance of a mobile‐agent system , 2002, Softw. Pract. Exp..

[308]  Hagit Attiya,et al.  An adaptive collect algorithm with applications , 2002, Distributed Computing.

[309]  Nancy A. Lynch,et al.  The BG distributed simulation algorithm , 2001, Distributed Computing.

[310]  Miguel Castro,et al.  BASE: using abstraction to improve fault tolerance , 2001, SOSP.

[311]  John M. Rushby,et al.  Bus Architectures for Safety-Critical Embedded Systems , 2001, EMSOFT.

[312]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[313]  Eli Gafni,et al.  The concurrency hierarchy, and algorithms for unbounded concurrency , 2001, PODC '01.

[314]  Shang-Hua Teng,et al.  Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time , 2001, STOC '01.

[315]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[316]  Richard M. Karp,et al.  Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems , 1972, Combinatorial Optimization.

[317]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[318]  R. Velazco,et al.  Experimentally evaluating an automatic approach for generating safety-critical software with respect to transient errors , 2000 .

[319]  Andris Ambainis,et al.  Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[320]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[321]  Michael Merritt,et al.  Computing with infinitely many processes , 2013, Inf. Comput..

[322]  Cyril Gavoille,et al.  Approximate Distance Labeling Schemes , 2000, Electron. Notes Discret. Math..

[323]  Masafumi Yamashita,et al.  Distributed memoryless point convergence algorithm for mobile robots with limited visibility , 1999, IEEE Trans. Robotics Autom..

[324]  Jacques Traoré,et al.  Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery , 1999, ICICS.

[325]  Maurice Herlihy,et al.  The topological structure of asynchronous computability , 1999, JACM.

[326]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[327]  Maria Gradinariu Potop-Butucaru,et al.  Memory space requirements for self-stabilizing leader election protocols , 1999, PODC '99.

[328]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[329]  Masafumi Yamashita,et al.  Distributed Anonymous Mobile Robots: Formation of Geometric Patterns , 1999, SIAM J. Comput..

[330]  Franck Petit,et al.  Time and Space Optimality of Distributed Depth-First Token Circulation Algorithms , 1999, WDAS.

[331]  Andrzej Pelc,et al.  Exploring unknown undirected graphs , 1999, SODA '98.

[332]  Yuval Rabani,et al.  Local divergence of Markov chains and the analysis of iterative load-balancing schemes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[333]  Tatsuaki Okamoto,et al.  A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications , 1998, EUROCRYPT.

[334]  Eli Gafni,et al.  Round-by-Round Fault Detectors: Unifying Synchrony and Asynchrony (Extended Abstract). , 1998, PODC 1998.

[335]  Mark Moir,et al.  Using local-spin k-exclusion algorithms to improve wait-free object implementations , 1997, Distributed Computing.

[336]  Moti Yung,et al.  The Local Detection Paradigm and Its Application to Self-Stabilization , 1997, Theor. Comput. Sci..

[337]  Boaz Patt-Shamir,et al.  Time-adaptive self stabilization , 1997, PODC '97.

[338]  Eli Gafni,et al.  A simple algorithmically reasoned characterization of wait-free computation (extended abstract) , 1997, PODC '97.

[339]  Yehuda Afek,et al.  Local stabilizer , 1997, Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems.

[340]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[341]  Dhar,et al.  Eulerian Walkers as a Model of Self-Organized Criticality. , 1996, Physical review letters.

[342]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[343]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[344]  Shlomi Dolev,et al.  SuperStabilizing protocols for dynamic distributed systems , 1995, PODC '95.

[345]  Silvio Micali,et al.  Verifiable Secret Sharing as Secure Computation , 1994, EUROCRYPT.

[346]  Boaz Patt-Shamir,et al.  Self-Stabilization by Local Checking and Global Reset (Extended Abstract) , 1994, WDAG.

[347]  Gil Neiger,et al.  Set-linearizability , 1994, PODC '94.

[348]  Maurice Herlihy,et al.  A simple constructive computability theorem for wait-free computation , 1994, STOC '94.

[349]  Eli Gafni,et al.  Immediate atomic snapshots and fast renaming , 1993, PODC '93.

[350]  Soma Chaudhuri,et al.  More Choices Allow More Faults: Set Consensus Problems in Totally Asynchronous Systems , 1993, Inf. Comput..

[351]  Boaz Patt-Shamir,et al.  Time optimal self-stabilizing synchronization , 1993, STOC.

[352]  Michael E. Saks,et al.  Wait-free k-set agreement is impossible: the topology of public knowledge , 1993, STOC.

[353]  Eli Gafni,et al.  Generalized FLP impossibility result for t-resilient asynchronous computations , 1993, STOC.

[354]  Bruce M. Maggs,et al.  Approximate load balancing on dynamic and asynchronous networks , 1993, STOC.

[355]  D. Deutsch,et al.  Rapid solution of problems by quantum computation , 1992, Proceedings of the Royal Society of London. Series A: Mathematical and Physical Sciences.

[356]  Sam Toueg,et al.  The weakest failure detector for solving consensus , 1992, PODC '92.

[357]  Janos Simon,et al.  Observing self-stabilization , 1992, PODC '92.

[358]  Nathan Linial,et al.  Locality in Distributed Graph Algorithms , 1992, SIAM J. Comput..

[359]  B. Awerbuch,et al.  Distributed program checking: a paradigm for building self-stabilizing distributed protocols , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[360]  Boaz Patt-Shamir,et al.  Self-stabilization by local checking and correction , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[361]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[362]  Donald Beaver,et al.  Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.

[363]  Amos Israeli,et al.  Resource bounds for self stabilizing message driven protocols , 1991, PODC '91.

[364]  Gurdip Singh Efficient distributed algorithms for leader election in complete networks , 1991, [1991] Proceedings. 11th International Conference on Distributed Computing Systems.

[365]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[366]  Maurice Herlihy,et al.  Counting networks and multi-processor coordination , 1991, STOC '91.

[367]  Maurice Herlihy,et al.  Wait-free synchronization , 1991, TOPL.

[368]  Jacques E. Boillat,et al.  Load Balancing and Poisson Equation in a Graph , 1990, Concurr. Pract. Exp..

[369]  Moti Yung,et al.  Memory-Efficient Self Stabilizing Protocols for General Networks , 1990, WDAG.

[370]  Soma Chaudhuri,et al.  Agreement is harder than consensus: set consensus problems in totally asynchronous systems , 1990, PODC '90.

[371]  Nir Shavit,et al.  Atomic snapshots of shared memory , 1990, JACM.

[372]  Hagit Attiya,et al.  Sharing memory robustly in message-passing systems , 1990, PODC '90.

[373]  Maurice Herlihy,et al.  Linearizability: a correctness condition for concurrent objects , 1990, TOPL.

[374]  Baruch Awerbuch,et al.  A trade-off between information and communication in broadcast protocols , 1990, JACM.

[375]  Shay Kutten,et al.  A modular technique for the design of efficient distributed leader finding algorithms , 1990, TOPL.

[376]  George Cybenko,et al.  Dynamic Load Balancing for Distributed Memory Multiprocessors , 1989, J. Parallel Distributed Comput..

[377]  Michaël Quisquater,et al.  How to Explain Zero-Knowledge Protocols to Your Children , 1989, CRYPTO.

[378]  Shmuel Zaks,et al.  Optimal Lower Bounds for Some Distributed Algorithms for a Complete Network of Processors , 1989, Theor. Comput. Sci..

[379]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[380]  Jan K. Pachl,et al.  Uniform self-stabilizing rings , 1988, TOPL.

[381]  Mark S. Boddy,et al.  An Analysis of Time-Dependent Planning , 1988, AAAI.

[382]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.

[383]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[384]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[385]  Eric Horvitz,et al.  Reasoning about beliefs and actions under computational resource constraints , 1987, Int. J. Approx. Reason..

[386]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[387]  Silvio Micali,et al.  Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[388]  Silvio Micali,et al.  How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.

[389]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[390]  Shmuel Zaks,et al.  The optimality of distributive constructions of minimum weight and degree restricted spanning trees in a complete network of processors , 1987, PODC '85.

[391]  Sam Toueg,et al.  Optimal clock synchronization , 1985, PODC '85.

[392]  Yehuda Afek,et al.  Time and message bounds for election in synchronous and asynchronous complete networks , 1985, PODC '85.

[393]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[394]  Danny Dolev,et al.  On the possibility and impossibility of achieving clock synchronization , 1984, STOC '84.

[395]  Nancy A. Lynch,et al.  A new fault-tolerant algorithm for clock synchronization , 1984, PODC '84.

[396]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[397]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[398]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[399]  Danny Dolev,et al.  Unanimity in an unknown and unreliable environment , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[400]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[401]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[402]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[403]  Gérard Le Lann,et al.  Distributed Systems - Towards a Formal Approach , 1977, IFIP Congress.

[404]  Edsger W. Dijkstra,et al.  Self-stabilizing systems in spite of distributed control , 1974, CACM.

[405]  E. A. Dinic Algorithm for solution of a problem of maximal flow in a network with power estimation , 1970 .

[406]  Frank Harary,et al.  Graph Theory , 2016 .

[407]  L. Dickson Finiteness of the Odd Perfect and Primitive Abundant Numbers with n Distinct Prime Factors , 1913 .

[408]  N. Vaidya,et al.  Implementing a Reliable Local Broadcast Primitive in Wireless Ad Hoc Networks , 2022 .