2009 |
142 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
Real life challenges in access-control management.
CHI 2009: 899-908 |
141 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009) |
2008 |
140 | EE | Lucas Ballard,
Seny Kamara,
Fabian Monrose,
Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates.
ACM Conference on Computer and Communications Security 2008: 235-244 |
139 | EE | Jonathan M. McCune,
Bryan Parno,
Adrian Perrig,
Michael K. Reiter,
Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution.
ASPLOS 2008: 14-25 |
138 | EE | Robert W. Reeder,
Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kelli Bacon,
Keisha How,
Heather Strong:
Expandable grids for visualizing and authoring computer security policies.
CHI 2008: 1473-1482 |
137 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
A user study of policy creation in a flexible access-control system.
CHI 2008: 543-552 |
136 | EE | Ting-Fang Yen,
Michael K. Reiter:
Traffic Aggregation for Malware Detection.
DIMVA 2008: 207-227 |
135 | EE | Zhuowei Li,
XiaoFeng Wang,
Zhenkai Liang,
Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures.
DSN 2008: 237-246 |
134 | EE | Jonathan M. McCune,
Bryan Parno,
Adrian Perrig,
Michael K. Reiter,
Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization.
EuroSys 2008: 315-328 |
133 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
BinHunt: Automatically Finding Semantic Differences in Binary Programs.
ICICS 2008: 238-255 |
132 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
Self-optimizing distributed trees.
IPDPS 2008: 1-12 |
131 | EE | Vyas Sekar,
Michael K. Reiter,
Walter Willinger,
Hui Zhang,
Ramana Rao Kompella,
David G. Andersen:
cSamp: A System for Network-Wide Flow Monitoring.
NSDI 2008: 233-246 |
130 | EE | Michael G. Merideth,
Michael K. Reiter:
Write Markers for Probabilistic Quorum Systems.
OPODIS 2008: 5-21 |
129 | EE | M. Patrick Collins,
Michael K. Reiter:
On the Limits of Payload-Oblivious Network Attack Detection.
RAID 2008: 251-270 |
128 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems.
SACMAT 2008: 185-194 |
127 | EE | Lucas Ballard,
Seny Kamara,
Michael K. Reiter:
The Practical Subtleties of Biometric Key Generation.
USENIX Security Symposium 2008: 61-74 |
126 | EE | XiaoFeng Wang,
Zhuowei Li,
Jong Youl Choi,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
125 | EE | Michael K. Reiter,
Asad Samar:
Quiver: Consistent and Scalable Object Sharing for Edge Services.
IEEE Trans. Parallel Distrib. Syst. 19(7): 878-889 (2008) |
124 | EE | XiaoFeng Wang,
Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense.
Int. J. Inf. Sec. 7(4): 243-263 (2008) |
2007 |
123 | EE | Michael G. Merideth,
Michael K. Reiter:
Probabilistic Opaque Quorum Systems.
DISC 2007: 403-419 |
122 | EE | Florian Oprea,
Michael K. Reiter:
Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks.
DSN 2007: 409-418 |
121 | EE | Michael K. Reiter:
Trustworthy Services and the Biological Analogy.
ESORICS 2007: 1 |
120 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems.
ESORICS 2007: 19-37 |
119 | EE | Jonathan M. McCune,
Bryan Parno,
Adrian Perrig,
Michael K. Reiter,
Arvind Seshadri:
Minimal TCB Code Execution.
IEEE Symposium on Security and Privacy 2007: 267-272 |
118 | EE | Kevin D. Bowers,
Lujo Bauer,
Deepak Garg,
Frank Pfenning,
Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
NDSS 2007 |
117 | EE | Scott E. Coull,
Charles V. Wright,
Fabian Monrose,
Michael P. Collins,
Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
NDSS 2007 |
116 | EE | James Hendricks,
Gregory R. Ganger,
Michael K. Reiter:
Verifying distributed erasure-coded data.
PODC 2007: 139-146 |
115 | EE | M. Patrick Collins,
Michael K. Reiter:
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.
RAID 2007: 276-295 |
114 | EE | James Hendricks,
Gregory R. Ganger,
Michael K. Reiter:
Low-overhead byzantine fault-tolerant storage.
SOSP 2007: 73-86 |
113 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system.
SOUPS 2007: 64-75 |
2006 |
112 | EE | XiaoFeng Wang,
Zhuowei Li,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil,
Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation.
ACM Conference on Computer and Communications Security 2006: 37-46 |
111 | EE | Yinglian Xie,
Michael K. Reiter,
David R. O'Hallaron:
Protecting Privacy in Key-Value Search Systems.
ACSAC 2006: 493-504 |
110 | EE | Alina Oprea,
Michael K. Reiter:
On Consistency of Encrypted Files.
DISC 2006: 254-268 |
109 | EE | Vyas Sekar,
Yinglian Xie,
Michael K. Reiter,
Hui Zhang:
A Multi-Resolution Approach forWorm Detection and Containment.
DSN 2006: 189-198 |
108 | EE | Michael P. Collins,
Michael K. Reiter:
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
ESORICS 2006: 1-17 |
107 | EE | Deepak Garg,
Lujo Bauer,
Kevin D. Bowers,
Frank Pfenning,
Michael K. Reiter:
A Linear Logic of Authorization and Knowledge.
ESORICS 2006: 297-312 |
106 | EE | Michael Abd-El-Malek,
Gregory R. Ganger,
Garth R. Goodson,
Michael K. Reiter,
Jay J. Wylie:
Towards bounded wait-free PASIS.
From Security to Dependability 2006 |
105 | EE | Ginger Perng,
Michael K. Reiter,
Chenxi Wang:
M2: Multicasting Mixes for Efficient and Anonymous Communication.
ICDCS 2006: 59 |
104 | EE | Yinglian Xie,
Vyas Sekar,
Michael K. Reiter,
Hui Zhang:
Forensic Analysis for Epidemic Attacks in Federated Networks.
ICNP 2006: 43-53 |
103 | EE | Daniel Golovin,
Anupam Gupta,
Bruce M. Maggs,
Florian Oprea,
Michael K. Reiter:
Quorum placement in networks: minimizing network congestion.
PODC 2006: 16-25 |
102 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Behavioral Distance Measurement Using Hidden Markov Models.
RAID 2006: 19-40 |
101 | EE | XiaoFeng Wang,
Michael K. Reiter:
WRAPS: Denial-of-Service Defense through Web Referrals.
SRDS 2006: 51-60 |
100 | EE | Jonathan M. McCune,
Adrian Perrig,
Michael K. Reiter:
Bump in the Ether: A Framework for Securing Sensitive User Input.
USENIX Annual Technical Conference, General Track 2006: 185-198 |
2005 |
99 | | John Riedl,
Michael J. Kearns,
Michael K. Reiter:
Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005
ACM 2005 |
98 | EE | Michael K. Reiter,
XiaoFeng Wang,
Matthew Wright:
Building Reliable Mix Networks with Fair Exchange.
ACNS 2005: 378-392 |
97 | EE | Jonathan M. McCune,
Adrian Perrig,
Michael K. Reiter:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
IEEE Symposium on Security and Privacy 2005: 110-124 |
96 | EE | Yinglian Xie,
Vyas Sekar,
David A. Maltz,
Michael K. Reiter,
Hui Zhang:
Worm Origin Identification Using Random Moonwalks.
IEEE Symposium on Security and Privacy 2005: 242-256 |
95 | EE | Jonathan M. McCune,
Elaine Shi,
Adrian Perrig,
Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
IEEE Symposium on Security and Privacy 2005: 64-78 |
94 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Distributed Proving in Access-Control Systems.
IEEE Symposium on Security and Privacy 2005: 81-95 |
93 | EE | Lujo Bauer,
Scott Garriss,
Jonathan M. McCune,
Michael K. Reiter,
Jason Rouse,
Peter Rutenbar:
Device-Enabled Authorization in the Grey-System.
ISC 2005: 431-445 |
92 | EE | Ginger Perng,
Michael K. Reiter,
Chenxi Wang:
Censorship Resistance Revisited.
Information Hiding 2005: 62-76 |
91 | EE | Alina Oprea,
Michael K. Reiter:
Space-Efficient Block Storage Integrity.
NDSS 2005 |
90 | EE | Anupam Gupta,
Bruce M. Maggs,
Florian Oprea,
Michael K. Reiter:
Quorum placement in networks to minimize access delays.
PODC 2005: 87-96 |
89 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection.
RAID 2005: 63-81 |
88 | EE | Michael Abd-El-Malek,
Gregory R. Ganger,
Garth R. Goodson,
Michael K. Reiter,
Jay J. Wylie:
Fault-scalable Byzantine fault-tolerant services.
SOSP 2005: 59-74 |
87 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
Distributed Construction of a Fault-Tolerant Network from a Tree.
SRDS 2005: 155-165 |
86 | EE | Michael Abd-El-Malek,
Gregory R. Ganger,
Michael K. Reiter,
Jay J. Wylie,
Garth R. Goodson:
Lazy Verification in Fault-Tolerant Distributed Storage Systems.
SRDS 2005: 179-190 |
2004 |
85 | EE | Michael K. Reiter,
XiaoFeng Wang:
Fragile mixing.
ACM Conference on Computer and Communications Security 2004: 227-235 |
84 | EE | XiaoFeng Wang,
Michael K. Reiter:
Mitigating bandwidth-exhaustion attacks using congestion puzzles.
ACM Conference on Computer and Communications Security 2004: 257-267 |
83 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection.
ACM Conference on Computer and Communications Security 2004: 318-329 |
82 | EE | Lea Kissner,
Alina Oprea,
Michael K. Reiter,
Dawn Xiaodong Song,
Ke Yang:
Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
ACNS 2004: 16-30 |
81 | EE | Garth R. Goodson,
Jay J. Wylie,
Gregory R. Ganger,
Michael K. Reiter:
Efficient Byzantine-Tolerant Erasure-Coded Storage.
DSN 2004: 135-144 |
80 | EE | Brian Neil Levine,
Michael K. Reiter,
Chenxi Wang,
Matthew Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Financial Cryptography 2004: 251-265 |
79 | EE | Darren Davis,
Fabian Monrose,
Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs.
ICICS 2004: 532-545 |
78 | EE | Michael K. Reiter:
Security by, and for, Converged Mobile Devices.
ICISC 2004: 1 |
77 | EE | Michael P. Collins,
Michael K. Reiter:
An Empirical Analysis of Target-Resident DoS Filters.
IEEE Symposium on Security and Privacy 2004: 103-114 |
76 | EE | Yinglian Xie,
Hyang-Ah Kim,
David R. O'Hallaron,
Michael K. Reiter,
Hui Zhang:
Seurat: A Pointillist Approach to Anomaly Detection.
RAID 2004: 238-257 |
75 | EE | Charles P. Fry,
Michael K. Reiter:
Nested Objects in a Byzantine Quorum-Replicated System.
SRDS 2004: 79-89 |
74 | EE | Philip D. MacKenzie,
Michael K. Reiter,
Ke Yang:
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract).
TCC 2004: 171-190 |
73 | EE | Debin Gao,
Michael K. Reiter,
Dawn Xiaodong Song:
On Gray-Box Program Tracking for Anomaly Detection.
USENIX Security Symposium 2004: 103-118 |
72 | EE | Darren Davis,
Fabian Monrose,
Michael K. Reiter:
On User Choice in Graphical Password Schemes.
USENIX Security Symposium 2004: 151-164 |
71 | EE | Michael K. Reiter,
Pankaj Rohatgi:
Homeland Security.
IEEE Internet Computing 8(6): 16-17 (2004) |
70 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Two-party generation of DSA signatures.
Int. J. Inf. Sec. 2(3-4): 218-239 (2004) |
2003 |
69 | EE | Philip D. MacKenzie,
Alina Oprea,
Michael K. Reiter:
Automatic generation of two-party computations.
ACM Conference on Computer and Communications Security 2003: 210-219 |
68 | EE | XiaoFeng Wang,
Michael K. Reiter:
Defending Against Denial-of-Service Attacks with Puzzle Auction.
IEEE Symposium on Security and Privacy 2003: 78-92 |
67 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure.
SRDS 2003: 339-348 |
66 | EE | Dahlia Malkhi,
Michael Merritt,
Michael K. Reiter,
Gadi Taubenfeld:
Objects shared by Byzantine processes.
Distributed Computing 16(1): 37-48 (2003) |
65 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Delegation of cryptographic servers for capture-resilient devices.
Distributed Computing 16(4): 307-327 (2003) |
64 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Networked cryptographic devices resilient to capture.
Int. J. Inf. Sec. 2(1): 1-20 (2003) |
63 | EE | Dahlia Malkhi,
Yishay Mansour,
Michael K. Reiter:
Diffusion without false rumors: on propagating updates in a Byzantine environment.
Theor. Comput. Sci. 1-3(299): 289-306 (2003) |
2002 |
62 | EE | Yinglian Xie,
David R. O'Hallaron,
Michael K. Reiter:
A Secure Distributed Search System.
HPDC 2002: 321- |
61 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Daniel P. Lopresti,
Chilin Shih:
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
USENIX Security Symposium 2002: 283-296 |
60 | | Pascal Felber,
Michael K. Reiter:
Advanced concurrency control in Java.
Concurrency and Computation: Practice and Experience 14(4): 261-285 (2002) |
59 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password hardening based on keystroke dynamics.
Int. J. Inf. Sec. 1(2): 69-83 (2002) |
2001 |
58 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Delegation of cryptographic servers for capture-resilient devices.
ACM Conference on Computer and Communications Security 2001: 10-19 |
57 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Two-Party Generation of DSA Signatures.
CRYPTO 2001: 137-154 |
56 | EE | Markus Jakobsson,
Michael K. Reiter:
Discouraging Software Piracy Using Software Aging.
Digital Rights Management Workshop 2001: 1-12 |
55 | EE | Gregory Chockler,
Dahlia Malkhi,
Michael K. Reiter:
Backoff Protocols for Distributed Mutual Exclusion and Ordering.
ICDCS 2001: 11-20 |
54 | EE | Philip D. MacKenzie,
Michael K. Reiter:
Networked Cryptographic Devices Resilient to Capture.
IEEE Symposium on Security and Privacy 2001: 12-25 |
53 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Susanne Wetzel:
Cryptographic Key Generation from Voice.
IEEE Symposium on Security and Privacy 2001: 202-213 |
52 | EE | Ran Canetti,
Yuval Ishai,
Ravi Kumar,
Michael K. Reiter,
Ronitt Rubinfeld,
Rebecca N. Wright:
Selective private function evaluation with applications to private statistics.
PODC 2001: 293-304 |
51 | EE | Dahlia Malkhi,
Ohad Rodeh,
Michael K. Reiter,
Yaron Sella:
Efficient Update Diffusion in Byzantine Environments.
SRDS 2001: 90-98 |
50 | EE | Pierangela Samarati,
Michael K. Reiter,
Sushil Jajodia:
An authorization model for a public key management service.
ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001) |
49 | EE | Roberto De Prisco,
Dahlia Malkhi,
Michael K. Reiter:
On k-Set Consensus Problems in Asynchronous Systems.
IEEE Trans. Parallel Distrib. Syst. 12(1): 7-21 (2001) |
48 | EE | Lorenzo Alvisi,
Dahlia Malkhi,
Evelyn Tumlin Pierce,
Michael K. Reiter:
Fault Detection for Byzantine Quorum Systems.
IEEE Trans. Parallel Distrib. Syst. 12(9): 996-1007 (2001) |
47 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Quorum Systems.
Inf. Comput. 170(2): 184-206 (2001) |
2000 |
46 | EE | Carlisle M. Adams,
Mike Burmester,
Yvo Desmedt,
Michael K. Reiter,
Philip Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session).
ACM Conference on Computer and Communications Security 2000: 98-101 |
45 | EE | Robert M. Arlein,
Ben Jai,
Markus Jakobsson,
Fabian Monrose,
Michael K. Reiter:
Privacy-preserving global customization.
ACM Conference on Electronic Commerce 2000: 176-184 |
44 | EE | Dahlia Malkhi,
Michael Merritt,
Michael K. Reiter,
Gadi Taubenfeld:
Objects Shared by Byzantine Processes.
DISC 2000: 345-359 |
43 | EE | Lorenzo Alvisi,
Evelyn Tumlin Pierce,
Dahlia Malkhi,
Michael K. Reiter,
Rebecca N. Wright:
Dynamic Byzantine Quorum Systems.
DSN 2000: 283- |
42 | EE | Dahlia Malkhi,
Michael K. Reiter:
An Architecture for Survivable Coordination in Large Distributed Systems.
IEEE Trans. Knowl. Data Eng. 12(2): 187-202 (2000) |
41 | EE | Dahlia Malkhi,
Michael K. Reiter:
Secure Execution of Java Applets Using a Remote Playground.
IEEE Trans. Software Eng. 26(12): 1197-1209 (2000) |
40 | | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems.
SIAM J. Comput. 29(6): 1889-1906 (2000) |
1999 |
39 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1999: 73-82 |
38 | EE | Roberto De Prisco,
Dahlia Malkhi,
Michael K. Reiter:
On k-Set Consensus Problems in Asynchronous Systems.
PODC 1999: 257-265 |
37 | EE | Dahlia Malkhi,
Yishay Mansour,
Michael K. Reiter:
On Diffusing Updates in a Byzantine Environment.
SRDS 1999: 134-143 |
36 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Authentication Metric Analysis and Design.
ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999) |
35 | EE | Dahlia Malkhi,
Michael K. Reiter:
Secure Execution of Java Applets using a Remote Playground
CoRR cs.CR/9908009: (1999) |
34 | EE | Dahlia Malkhi,
Yishay Mansour,
Michael K. Reiter:
On Propagating Updates in a Byzantine Environment
CoRR cs.DC/9908010: (1999) |
33 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems
CoRR cs.DC/9908011: (1999) |
32 | EE | Michael K. Reiter,
Aviel D. Rubin:
Anonymous Web Transactions with Crowds.
Commun. ACM 42(2): 32-38 (1999) |
31 | EE | Vinod Anupam,
Alain J. Mayer,
Kobbi Nissim,
Benny Pinkas,
Michael K. Reiter:
On the Security of Pay-per-Click and Other Web Advertising Schemes.
Computer Networks 31(11-16): 1091-1100 (1999) |
30 | | Michael K. Reiter:
High-Confidence Distributed Systems - Guest Editor's Introduction.
IEEE Internet Computing 3(6): 52-54 (1999) |
1998 |
29 | EE | Dahlia Malkhi,
Michael K. Reiter,
Aviel D. Rubin:
Secure Execution of Java Applets using a Remote Playground.
IEEE Symposium on Security and Privacy 1998: 40-51 |
28 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems.
PODC 1998: 321 |
27 | | Dahlia Malkhi,
Michael K. Reiter:
Survivable Consensus Objects.
SRDS 1998: 271-279 |
26 | | Dahlia Malkhi,
Michael K. Reiter:
Secure and Scalable Replication in Phalanx.
SRDS 1998: 51-58 |
25 | EE | Michael K. Reiter,
Aviel D. Rubin:
Crowds: Anonymity for Web Transactions.
ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) |
24 | EE | Dahlia Malkhi,
Michael K. Reiter:
Byzantine Quorum Systems.
Distributed Computing 11(4): 203-213 (1998) |
23 | | Michael K. Reiter,
Stuart G. Stubblebine:
Resilient Authentication Using Path Independence.
IEEE Trans. Computers 47(12): 1351-1362 (1998) |
1997 |
22 | EE | Matthew K. Franklin,
Michael K. Reiter:
Fair Exchange with a Semi-Trusted Third Party (extended abstract).
ACM Conference on Computer and Communications Security 1997: 1-5 |
21 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Path Independence for Authentication in Large-Scale Systems.
ACM Conference on Computer and Communications Security 1997: 57-66 |
20 | EE | Dahlia Malkhi,
Michael K. Reiter:
Unreliable Intrusion Detection in Distributed Computations.
CSFW 1997: 116-125 |
19 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Toward Acceptable Metrics of Authentication.
IEEE Symposium on Security and Privacy 1997: 10-20 |
18 | | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems.
PODC 1997: 249-257 |
17 | | Dahlia Malkhi,
Michael K. Reiter,
Rebecca N. Wright:
Probabilistic Quorum Systems.
PODC 1997: 267-273 |
16 | EE | Dahlia Malkhi,
Michael K. Reiter:
Byzantine Quorum Systems.
STOC 1997: 569-578 |
15 | | Dahlia Malkhi,
Michael K. Reiter:
A High-Throughput Secure Reliable Multicast Protocol.
Journal of Computer Security 5(2): 113-128 (1997) |
1996 |
14 | EE | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
ACM Conference on Computer and Communications Security 1996: 38-47 |
13 | EE | Dalia Malki,
Michael K. Reiter:
A High-Throughput Secure Reliable Multicast Protocol.
CSFW 1996: 9-17 |
12 | EE | Don Coppersmith,
Matthew K. Franklin,
Jacques Patarin,
Michael K. Reiter:
Low-Exponent RSA with Related Messages.
EUROCRYPT 1996: 1-9 |
11 | | Michael K. Reiter:
Distributed Trust with the Rampart Toolkit.
Commun. ACM 39(4): 71-74 (1996) |
10 | EE | Michael K. Reiter:
A Secure Group Membership Protocol.
IEEE Trans. Software Eng. 22(1): 31-42 (1996) |
9 | EE | Matthew K. Franklin,
Michael K. Reiter:
The Design and Implementation of a Secure Auction Service.
IEEE Trans. Software Eng. 22(5): 302-312 (1996) |
8 | | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
Journal of Computer Security 4(4): 267-288 (1996) |
1995 |
7 | EE | Matthew K. Franklin,
Michael K. Reiter:
Verifiable Signature Sharing.
EUROCRYPT 1995: 50-63 |
6 | | Michael K. Reiter,
Li Gong:
Securing Causal Relationships in Distributed Systems.
Comput. J. 38(8): 633-642 (1995) |
1994 |
5 | EE | Michael K. Reiter:
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
ACM Conference on Computer and Communications Security 1994: 68-80 |
4 | | Michael K. Reiter:
The Rampart Toolkit for Building High-Integrity Services.
Dagstuhl Seminar on Distributed Systems 1994: 99-110 |
3 | EE | Michael K. Reiter,
Kenneth P. Birman,
Robbert van Renesse:
A Security Architecture for Fault-Toerant Systems.
ACM Trans. Comput. Syst. 12(4): 340-371 (1994) |
2 | EE | Michael K. Reiter,
Kenneth P. Birman:
How to Securely Replicate Services.
ACM Trans. Program. Lang. Syst. 16(3): 986-1009 (1994) |
1992 |
1 | | Michael K. Reiter:
Integrating Security in a Group Oriented Distributed System (Abstract).
Operating Systems Review 26(2): 27 (1992) |