No abstract available.
Cited By
- Abolfazli S, Sanaei Z, Gani A, Xia F and Yang L (2014). Rich Mobile Applications, Journal of Network and Computer Applications, 40:C, (345-362), Online publication date: 1-Apr-2014.
- Baldoni R, Bonomi S, Cerocchi A and Querzoni L Improving validity of query answering in dynamic systems Proceedings of the Third International Workshop on Reliability, Availability, and Security, (1-6)
- Distler T, Kapitza R and Reiser H Efficient state transfer for hypervisor-based proactive recovery Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systems, (1-6)
- Kapitza R, Zeman T, Hauck F and Reiser H Parallel state transfer in object replication systems Proceedings of the 7th IFIP WG 6.1 international conference on Distributed applications and interoperable systems, (167-180)
- Chen D, Turner S and Cai W A Framework for Robust HLA-based Distributed Simulations Proceedings of the 20th Workshop on Principles of Advanced and Distributed Simulation, (183-192)
- Chiu G, Hsiao C and Chang W (2005). Total ordering group communication protocol based on coordinating sequencers for multiple overlapping groups, Journal of Parallel and Distributed Computing, 65:4, (437-447), Online publication date: 1-Apr-2005.
- Özkasap Ö (2004). Performance study of a probabilistic multicast transport protocol, Performance Evaluation, 57:2, (177-198), Online publication date: 1-Jun-2004.
- Pascoe J, Loader R and Sunderam V (2019). Collaborative Group Membership, The Journal of Supercomputing, 22:1, (55-68), Online publication date: 1-May-2002.
- Mascolo C, Capra L, Zachariadis S and Emmerich W (2019). XMIDDLE, Wireless Personal Communications: An International Journal, 21:1, (77-103), Online publication date: 1-Apr-2002.
- Alexandrov N, Pascoe J and Alexandrov V Collaborative Computing and E-learning Proceedings of the International Conference on Computational Science-Part II, (688-694)
- Pascoe J, Sunderam V and Loader R Working Towards Strong Wireless Group Communications Proceedings of the International Conference on Computational Science-Part II, (655-664)
- Friedman R and Vitenberg R A framework for caching multimedia objects in the Internet Proceedings of the 2001 international workshop on Multimedia middleware, (52-55)
- Roughgarden T Stackelberg scheduling strategies Proceedings of the thirty-third annual ACM symposium on Theory of computing, (104-113)
- Chockler G, Keidar I and Vitenberg R (2001). Group communication specifications, ACM Computing Surveys (CSUR), 33:4, (427-469), Online publication date: 1-Dec-2001.
- Emmerich W Software engineering and middleware Proceedings of the Conference on The Future of Software Engineering, (117-129)
- Rodeheffer T, Thekkath C and Anderson D (2019). SmartBridge, ACM SIGCOMM Computer Communication Review, 30:4, (205-216), Online publication date: 1-Oct-2000.
- Rodeheffer T, Thekkath C and Anderson D SmartBridge Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (205-216)
- Chockler G, Dolev D, Friedman R and Vitenberg R Implementing a caching service a distributed COBRA objects IFIP/ACM International Conference on Distributed systems platforms, (1-23)
- Endler M An atomic multicast protocol for mobile computing Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications, (56-63)
- Birman K, Hayden M, Ozkasap O, Xiao Z, Budiu M and Minsky Y (1999). Bimodal multicast, ACM Transactions on Computer Systems (TOCS), 17:2, (41-88), Online publication date: 1-May-1999.
- Lagoze C, Fielding D and Payette S Making global digital libraries work Proceedings of the third ACM conference on Digital libraries, (134-143)
- Damani O and Garg V Fault-tolerant distributed simulation Proceedings of the twelfth workshop on Parallel and distributed simulation, (38-45)
- Damani O and Garg V (2019). Fault-tolerant distributed simulation, ACM SIGSIM Simulation Digest, 28:1, (38-45), Online publication date: 1-Jul-1998.
- Vogels W, van Renesse R and Birman K Six misconceptions about reliable distributed computing Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications, (276-279)
Index Terms
- Building secure and reliable network applications
Recommendations
Strongly secure certificateless short signatures
Highlights We introduce a new efficient and secure short certificateless signature scheme. It is strongly unforgeable. The security is based on the CDH assumption. The proposed scheme is provably secure against a relatively stronger adversary. Short ...
Delegatable homomorphic encryption with applications to secure outsourcing of computation
CT-RSA'12: Proceedings of the 12th conference on Topics in CryptologyWe propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the evaluation of circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This ...
Secure universal designated verifier signature without random oracles
In Asiacrypt 2003, the concept of universal designated verifier signature (UDVS) was introduced by Steinfeld, Bull, Wang and Pieprzyk. In the new paradigm, any signature holder (not necessarily the signer) can designate the publicly verifiable signature ...