


default search action
DIMACS Workshop: Distributed Computing And Cryptography 1989
- Joan Feigenbaum, Michael Merritt:

Distributed Computing And Cryptography, Proceedings of a DIMACS Workshop, Princeton, New Jersey, USA, October 4-6, 1989. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 2, DIMACS/AMS 1991, ISBN 978-0-8218-6590-3 - Preface. Distributed Computing And Cryptography 1989: vii-viii

- Foreword. Distributed Computing And Cryptography 1989: ix

- Joan Feigenbaum, Michael Merritt:

Open Questions, Talk Abstracts, and Summary of Discussions. 1-46 - Donald Beaver:

Formal Definitions for Secure Distributed Protocols. 47-64 - Donald Beaver:

Perfect Privacy For Two-Party Protocols. 65-78 - Mihir Bellare, Lenore Cowen, Shafi Goldwasser:

On the Structure of Secret Key Exchange Protocols. 79-92 - Matt Bishop:

Privacy-Enhanced Electronic Mail. 93-106 - Manuel Blum, Michael Luby, Ronitt Rubinfeld:

Program Result Checking against Adaptive Programs and in Cryptographic Settings. 107-118 - Michael Burrows, Martín Abadi, Roger M. Needham:

The Scope of a Logic of Authentication. 119-126 - Deborah Estrin, Gene Tsudik:

Secure Policy Enforcement in Internetworks. 127-154 - Uriel Feige, Adi Shamir:

On Expected Polynomial Time Simulation of Zero Knowledge Protocols. 155-160 - Joan Feigenbaum, Mark Y. Liberman, Rebecca N. Wright:

Cryptographic Protection of Databases and Software. 161-172 - Michael J. Fischer, Michael S. Paterson, Charles Rackoff:

Secret Bit Transmission Using a Random Deal of Cards. 173-182 - Zvi Galil, Stuart Haber, Moti Yung:

Security against Replay Chosen-Ciphertext Attack. 183-190 - Richard J. Lipton:

New Directions In Testing. 191-202 - Michael Merritt:

Towards a Theory of Cryptographic Systems: A Critique of Crypto-Complexity. 203-212 - Alon Orlitsky:

Feeback in Discrete Communication. 213-228 - Rafail Ostrovsky

, Moti Yung:
On Necessary Conditions for Secure Distributed Computation. 229-234 - Jim Reeds:

Secure IX Network. 235-244 - Marie-Jeanne Toussaint, Pierre Wolper:

Reasoning about Cryptographic Protocols. 245-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














