How to Make Replicated Data Secure
- 1 January 1988
- book chapter
- Published by Springer Nature
- p. 379-391
- https://doi.org/10.1007/3-540-48184-2_33
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Achieving independence in logarithmic number of roundsPublished by Association for Computing Machinery (ACM) ,1987
- A quorum-consensus replication method for abstract data typesACM Transactions on Computer Systems, 1986
- Secure communication using remote procedure callsACM Transactions on Computer Systems, 1985
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Weighted voting for replicated dataPublished by Association for Computing Machinery (ACM) ,1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976