Author:
Gordon S. Dov,Katz Jonathan,Kumaresan Ranjit,Yerukhimovich Arkady
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference10 articles.
1. Authenticated algorithms for Byzantine agreement;Dolev;SIAM J. Comput.,1983
2. Generalized communication and security models in Byzantine agreement;Fitzi,2002
3. Multi-party computation with hybrid security;Fitzi,2004
4. From partial consistency to global broadcast;Fitzi,2000
5. A digital signature scheme secure against adaptive chosen-message attacks;Goldwasser;SIAM J. Comput.,1988
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献