Login / Signup
Distributed Computing And Cryptography
1989
1990
1991
1989
1991
Keyphrases
Publications
volume 2, 1991
Distributed Computing And Cryptography, Proceedings of a DIMACS Workshop, Princeton, New Jersey, USA, October 4-6, 1989
Distributed Computing And Cryptography
2 (1991)
1989
Zvi Galil
,
Stuart Haber
,
Moti Yung
Security against Replay Chosen-Ciphertext Attack.
Distributed Computing And Cryptography
(1989)
Uriel Feige
,
Adi Shamir
On Expected Polynomial Time Simulation of Zero Knowledge Protocols.
Distributed Computing And Cryptography
(1989)
Donald Beaver
Formal Definitions for Secure Distributed Protocols.
Distributed Computing And Cryptography
(1989)
Jim Reeds
Secure IX Network.
Distributed Computing And Cryptography
(1989)
Marie-Jeanne Toussaint
,
Pierre Wolper
Reasoning about Cryptographic Protocols.
Distributed Computing And Cryptography
(1989)
Alon Orlitsky
Feeback in Discrete Communication.
Distributed Computing And Cryptography
(1989)
Foreword.
Distributed Computing And Cryptography
(1989)
Michael J. Fischer
,
Michael S. Paterson
,
Charles Rackoff
Secret Bit Transmission Using a Random Deal of Cards.
Distributed Computing And Cryptography
(1989)
Matt Bishop
Privacy-Enhanced Electronic Mail.
Distributed Computing And Cryptography
(1989)
Michael Merritt
Towards a Theory of Cryptographic Systems: A Critique of Crypto-Complexity.
Distributed Computing And Cryptography
(1989)
Joan Feigenbaum
,
Michael Merritt
Open Questions, Talk Abstracts, and Summary of Discussions.
Distributed Computing And Cryptography
(1989)
Joan Feigenbaum
,
Mark Y. Liberman
,
Rebecca N. Wright
Cryptographic Protection of Databases and Software.
Distributed Computing And Cryptography
(1989)
Manuel Blum
,
Michael Luby
,
Ronitt Rubinfeld
Program Result Checking against Adaptive Programs and in Cryptographic Settings.
Distributed Computing And Cryptography
(1989)
Mihir Bellare
,
Lenore Cowen
,
Shafi Goldwasser
On the Structure of Secret Key Exchange Protocols.
Distributed Computing And Cryptography
(1989)
Donald Beaver
Perfect Privacy For Two-Party Protocols.
Distributed Computing And Cryptography
(1989)
Richard J. Lipton
New Directions In Testing.
Distributed Computing And Cryptography
(1989)
Rafail Ostrovsky
,
Moti Yung
On Necessary Conditions for Secure Distributed Computation.
Distributed Computing And Cryptography
(1989)
Deborah Estrin
,
Gene Tsudik
Secure Policy Enforcement in Internetworks.
Distributed Computing And Cryptography
(1989)
Michael Burrows
,
Martín Abadi
,
Roger M. Needham
The Scope of a Logic of Authentication.
Distributed Computing And Cryptography
(1989)
Preface.
Distributed Computing And Cryptography
(1989)