dblp.uni-trier.dewww.uni-trier.de

Christian Cachin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
47EELars Arge, Christian Cachin, Andrzej Tarlecki: Preface. Theor. Comput. Sci. 410(18): 1617 (2009)
2008
46EEChristian Cachin, Idit Keidar, Alexander Shraer: Principles of untrusted storage: a new look at consistency conditions. PODC 2008: 426
45EEChristian Cachin, Idit Keidar, Alexander Shraer: Fork Sequential Consistency is Blocking CoRR abs/0805.2068: (2008)
2007
44 Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: From Security to Dependability, 10.09. - 15.09.2006 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007
43 Lars Arge, Christian Cachin, Tomasz Jurdzinski, Andrzej Tarlecki: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings Springer 2007
42EERoman Pletka, Christian Cachin: Cryptographic Security for a High-Performance Distributed File System. MSST 2007: 227-232
41EEChristian Cachin, Abhi Shelat, Alexander Shraer: Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138
2006
40EEChristian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DSN 2006: 115-124
39EEMichael Backes, Christian Cachin, Alina Oprea: Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346
38EEChristian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006
37EEChristian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006
2005
36EEChristian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DISC 2005: 497-498
35EEChristian Cachin, Stefano Tessaro: Asynchronous Verifiable Information Dispersal. DISC 2005: 503-504
34EEMichael Backes, Christian Cachin, Alina Oprea: Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11
33EEHariGovind V. Ramasamy, Christian Cachin: Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. OPODIS 2005: 88-102
32EEChristian Cachin, Stefano Tessaro: Asynchronous Veri.able Information Dispersal. SRDS 2005: 191-202
31EEMichael Backes, Christian Cachin: Public-Key Steganography with Active Attacks. TCC 2005: 210-226
30EEChristian Cachin: Digital Steganography. Encyclopedia of Cryptography and Security 2005
29EEChristian Cachin, Klaus Kursawe, Victor Shoup: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. J. Cryptology 18(3): 219-246 (2005)
2004
28 Christian Cachin, Jan Camenisch: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings Springer 2004
27EEChristian Cachin, Asad Samar: Secure Distributed DNS. DSN 2004: 423-432
26EEChristian Cachin, Reto Strobl: Asynchronous group key exchange with failures. PODC 2004: 357-366
25EEChristian Cachin: An information-theoretic model for steganography. Inf. Comput. 192(1): 41-56 (2004)
2003
24EEMichael Backes, Christian Cachin: Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46
23EEChristian Cachin: Modeling Complexity in Secure Distributed Computing. Future Directions in Distributed Computing 2003: 57-61
22EEChristian Cachin: An asynchronous protocol for distributed computation of RSA inverses and its applications. PODC 2003: 153-162
21EEMichael Backes, Christian Cachin, Reto Strobl: Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232
2002
20EEChristian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl: Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88-97
19EEChristian Cachin, Jonathan A. Poritz: Secure Intrusion-tolerant Replication on the Internet. DSN 2002: 167-176
2001
18EEChristian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup: Secure and Efficient Asynchronous Broadcast Protocols. CRYPTO 2001: 524-541
17EEChristian Cachin: Distributing Trust on the Internet . DSN 2001: 183-192
16EEJoy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11
2000
15EEChristian Cachin, Jan Camenisch: Optimistic Fair Secure Computation. CRYPTO 2000: 93-111
14EEChristian Cachin, Jan Camenisch, Joe Kilian, Joy Müller: One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523
13EEChristian Cachin, Klaus Kursawe, Victor Shoup: Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). PODC 2000: 123-132
1999
12EEChristian Cachin: Efficient Private Bidding and Auctions with an Oblivious Third Party. ACM Conference on Computer and Communications Security 1999: 120-127
11EEChristian Cachin, Silvio Micali, Markus Stadler: Computationally Private Information Retrieval with Polylogarithmic Communication. EUROCRYPT 1999: 402-414
1998
10EEChristian Cachin: On the Foundations of Oblivious Transfer. EUROCRYPT 1998: 361-374
9EEChristian Cachin, Claude Crépeau, Julien Marcil: Oblivious Transfer with a Memory-Bounded Receiver. FOCS 1998: 493-502
8EEChristian Cachin: An Information-Theoretic Model for Steganography. Information Hiding 1998: 306-318
1997
7EEChristian Cachin, Ueli M. Maurer: Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306
6EEChristian Cachin: Smooth Entropy and Rényi Entropy. EUROCRYPT 1997: 193-208
5 Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification. J. Cryptology 10(2): 97-110 (1997)
1995
4 Christian Cachin: On-Line Secret Sharing. IMA Conf. 1995: 190-198
1994
3EEChristian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274
2EEChristian Cachin: Pedagogical pattern selection strategies. Neural Networks 7(1): 175-181 (1994)
1993
1 Matthias Rauterberg, Christian Cachin: Locating the Primary Attention Focus of the User. VCHCI 1993: 129-140

Coauthor Index

1Joy Algesheimer [16]
2Lars Arge [43] [47]
3Michael Backes [21] [24] [31] [34] [39]
4Jan Camenisch [14] [15] [16] [28]
5Claude Crépeau [9]
6Felix C. Freiling (Felix C. Gärtner) [37] [38] [44]
7Jaap-Henk Hoepman [37] [38] [44]
8Tomasz Jurdzinski [43]
9Günter Karjoth [16]
10Idit Keidar [45] [46]
11Joe Kilian [14]
12Klaus Kursawe [13] [18] [20] [29]
13Anna Lysyanskaya [20]
14Julien Marcil [9]
15Ueli M. Maurer [3] [5] [7]
16Silvio Micali [11]
17Joy Müller [14]
18Alina Oprea [34] [39]
19Frank Petzold [18]
20Roman Pletka [42]
21Jonathan A. Poritz [19]
22HariGovind V. Ramasamy [33]
23Matthias Rauterberg [1]
24Asad Samar [27]
25Abhi Shelat [41]
26Victor Shoup [13] [18] [29]
27Alexander Shraer [41] [45] [46]
28Markus Stadler [11]
29Reto Strobl [20] [21] [26]
30Andrzej Tarlecki [43] [47]
31Stefano Tessaro [32] [35] [36] [40]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)