Proactive secret sharing

Results: 18



#Item
11System software / Computing / Verifiable secret sharing / Server hardware / Secret sharing / Server / Proactive secret sharing / X Window System / Cryptographic protocols / Software / Cryptography

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
12Computing / Secret sharing / Barbara Jane Liskov / Proactive secret sharing / Proactivity / Communications protocol / Transmission Control Protocol / Cryptographic protocols / Data / Information

Mobile Proactive Secret Sharing by David Andrew Schultz Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2008-08-05 16:45:03
13Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
14Data synchronization / Cryptography / Theory of computation / Server / Barbara Jane Liskov / Secret sharing / Byzantine fault tolerance / Replication / Proactive secret sharing / Computing / Fault-tolerant computer systems / Cryptographic protocols

Authentication in a Reconfigurable Byzantine Fault Tolerant System by Kathryn Chen Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.lcs.mit.edu

Language: English - Date: 2005-01-26 20:47:49
15Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
16Key management / Electronic commerce / RSA / Digital signature / Secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / RSA numbers / Cryptography / Public-key cryptography / Cryptographic protocols

Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2005-03-04 00:10:28
17Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
UPDATE