Author:
Yang Jong-Phil,Sur Chul,Rhee Kyung Hyune
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Proceedings of the 26th ACM Symposium on the Theory of Computing, Santa Fe, pp. 522–533 (1994)
2. Lecture Notes in Computer Science;A. Herzberg,1995
3. Menezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
4. Schneier, B., Riordan, J.: A certified e-mail protocol. In: 13th Annual Computer Security Applications Conference, December 1998, pp. 100–106 (1998)
5. Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing 11(4), 203–213 (1998)