Intrusion tolerance in distributed computing systems
- 10 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 110-121
- https://doi.org/10.1109/risp.1991.130780
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- How To Prove Yourself: Practical Solutions to Identification and Signature ProblemsPublished by Springer Nature ,2000
- Efficient dispersal of information for security, load balancing, and fault toleranceJournal of the ACM, 1989
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987
- Intrusion-Tolerance Using Fine-Grain Fragmentation-ScatteringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A Distributed Secure SystemComputer, 1983
- Password authentication with insecure communicationCommunications of the ACM, 1981
- How to share a secretCommunications of the ACM, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978