2009 | ||
---|---|---|
142 | EE | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908 |
141 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009) |
2008 | ||
140 | EE | Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter: Towards practical biometric key generation with randomized biometric templates. ACM Conference on Computer and Communications Security 2008: 235-244 |
139 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 |
138 | EE | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 |
137 | EE | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 |
136 | EE | Ting-Fang Yen, Michael K. Reiter: Traffic Aggregation for Malware Detection. DIMVA 2008: 207-227 |
135 | EE | Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter: AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246 |
134 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki: Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 |
133 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255 |
132 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: Self-optimizing distributed trees. IPDPS 2008: 1-12 |
131 | EE | Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen: cSamp: A System for Network-Wide Flow Monitoring. NSDI 2008: 233-246 |
130 | EE | Michael G. Merideth, Michael K. Reiter: Write Markers for Probabilistic Quorum Systems. OPODIS 2008: 5-21 |
129 | EE | M. Patrick Collins, Michael K. Reiter: On the Limits of Payload-Oblivious Network Attack Detection. RAID 2008: 251-270 |
128 | EE | Lujo Bauer, Scott Garriss, Michael K. Reiter: Detecting and resolving policy misconfigurations in access-control systems. SACMAT 2008: 185-194 |
127 | EE | Lucas Ballard, Seny Kamara, Michael K. Reiter: The Practical Subtleties of Biometric Key Generation. USENIX Security Symposium 2008: 61-74 |
126 | EE | XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
125 | EE | Michael K. Reiter, Asad Samar: Quiver: Consistent and Scalable Object Sharing for Edge Services. IEEE Trans. Parallel Distrib. Syst. 19(7): 878-889 (2008) |
124 | EE | XiaoFeng Wang, Michael K. Reiter: A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008) |
2007 | ||
123 | EE | Michael G. Merideth, Michael K. Reiter: Probabilistic Opaque Quorum Systems. DISC 2007: 403-419 |
122 | EE | Florian Oprea, Michael K. Reiter: Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. DSN 2007: 409-418 |
121 | EE | Michael K. Reiter: Trustworthy Services and the Biological Analogy. ESORICS 2007: 1 |
120 | EE | Lujo Bauer, Scott Garriss, Michael K. Reiter: Efficient Proving for Practical Distributed Access-Control Systems. ESORICS 2007: 19-37 |
119 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: Minimal TCB Code Execution. IEEE Symposium on Security and Privacy 2007: 267-272 |
118 | EE | Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter: Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007 |
117 | EE | Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007 |
116 | EE | James Hendricks, Gregory R. Ganger, Michael K. Reiter: Verifying distributed erasure-coded data. PODC 2007: 139-146 |
115 | EE | M. Patrick Collins, Michael K. Reiter: Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. RAID 2007: 276-295 |
114 | EE | James Hendricks, Gregory R. Ganger, Michael K. Reiter: Low-overhead byzantine fault-tolerant storage. SOSP 2007: 73-86 |
113 | EE | Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 |
2006 | ||
112 | EE | XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46 |
111 | EE | Yinglian Xie, Michael K. Reiter, David R. O'Hallaron: Protecting Privacy in Key-Value Search Systems. ACSAC 2006: 493-504 |
110 | EE | Alina Oprea, Michael K. Reiter: On Consistency of Encrypted Files. DISC 2006: 254-268 |
109 | EE | Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang: A Multi-Resolution Approach forWorm Detection and Containment. DSN 2006: 189-198 |
108 | EE | Michael P. Collins, Michael K. Reiter: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. ESORICS 2006: 1-17 |
107 | EE | Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter: A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312 |
106 | EE | Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie: Towards bounded wait-free PASIS. From Security to Dependability 2006 |
105 | EE | Ginger Perng, Michael K. Reiter, Chenxi Wang: M2: Multicasting Mixes for Efficient and Anonymous Communication. ICDCS 2006: 59 |
104 | EE | Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Zhang: Forensic Analysis for Epidemic Attacks in Federated Networks. ICNP 2006: 43-53 |
103 | EE | Daniel Golovin, Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter: Quorum placement in networks: minimizing network congestion. PODC 2006: 16-25 |
102 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40 |
101 | EE | XiaoFeng Wang, Michael K. Reiter: WRAPS: Denial-of-Service Defense through Web Referrals. SRDS 2006: 51-60 |
100 | EE | Jonathan M. McCune, Adrian Perrig, Michael K. Reiter: Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX Annual Technical Conference, General Track 2006: 185-198 |
2005 | ||
99 | John Riedl, Michael J. Kearns, Michael K. Reiter: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005 ACM 2005 | |
98 | EE | Michael K. Reiter, XiaoFeng Wang, Matthew Wright: Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392 |
97 | EE | Jonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. IEEE Symposium on Security and Privacy 2005: 110-124 |
96 | EE | Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang: Worm Origin Identification Using Random Moonwalks. IEEE Symposium on Security and Privacy 2005: 242-256 |
95 | EE | Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78 |
94 | EE | Lujo Bauer, Scott Garriss, Michael K. Reiter: Distributed Proving in Access-Control Systems. IEEE Symposium on Security and Privacy 2005: 81-95 |
93 | EE | Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar: Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445 |
92 | EE | Ginger Perng, Michael K. Reiter, Chenxi Wang: Censorship Resistance Revisited. Information Hiding 2005: 62-76 |
91 | EE | Alina Oprea, Michael K. Reiter: Space-Efficient Block Storage Integrity. NDSS 2005 |
90 | EE | Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter: Quorum placement in networks to minimize access delays. PODC 2005: 87-96 |
89 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance for Intrusion Detection. RAID 2005: 63-81 |
88 | EE | Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie: Fault-scalable Byzantine fault-tolerant services. SOSP 2005: 59-74 |
87 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: Distributed Construction of a Fault-Tolerant Network from a Tree. SRDS 2005: 155-165 |
86 | EE | Michael Abd-El-Malek, Gregory R. Ganger, Michael K. Reiter, Jay J. Wylie, Garth R. Goodson: Lazy Verification in Fault-Tolerant Distributed Storage Systems. SRDS 2005: 179-190 |
2004 | ||
85 | EE | Michael K. Reiter, XiaoFeng Wang: Fragile mixing. ACM Conference on Computer and Communications Security 2004: 227-235 |
84 | EE | XiaoFeng Wang, Michael K. Reiter: Mitigating bandwidth-exhaustion attacks using congestion puzzles. ACM Conference on Computer and Communications Security 2004: 257-267 |
83 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004: 318-329 |
82 | EE | Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang: Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30 |
81 | EE | Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter: Efficient Byzantine-Tolerant Erasure-Coded Storage. DSN 2004: 135-144 |
80 | EE | Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright: Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 |
79 | EE | Darren Davis, Fabian Monrose, Michael K. Reiter: Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545 |
78 | EE | Michael K. Reiter: Security by, and for, Converged Mobile Devices. ICISC 2004: 1 |
77 | EE | Michael P. Collins, Michael K. Reiter: An Empirical Analysis of Target-Resident DoS Filters. IEEE Symposium on Security and Privacy 2004: 103-114 |
76 | EE | Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang: Seurat: A Pointillist Approach to Anomaly Detection. RAID 2004: 238-257 |
75 | EE | Charles P. Fry, Michael K. Reiter: Nested Objects in a Byzantine Quorum-Replicated System. SRDS 2004: 79-89 |
74 | EE | Philip D. MacKenzie, Michael K. Reiter, Ke Yang: Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). TCC 2004: 171-190 |
73 | EE | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song: On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118 |
72 | EE | Darren Davis, Fabian Monrose, Michael K. Reiter: On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164 |
71 | EE | Michael K. Reiter, Pankaj Rohatgi: Homeland Security. IEEE Internet Computing 8(6): 16-17 (2004) |
70 | EE | Philip D. MacKenzie, Michael K. Reiter: Two-party generation of DSA signatures. Int. J. Inf. Sec. 2(3-4): 218-239 (2004) |
2003 | ||
69 | EE | Philip D. MacKenzie, Alina Oprea, Michael K. Reiter: Automatic generation of two-party computations. ACM Conference on Computer and Communications Security 2003: 210-219 |
68 | EE | XiaoFeng Wang, Michael K. Reiter: Defending Against Denial-of-Service Attacks with Puzzle Auction. IEEE Symposium on Security and Privacy 2003: 78-92 |
67 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003: 339-348 |
66 | EE | Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects shared by Byzantine processes. Distributed Computing 16(1): 37-48 (2003) |
65 | EE | Philip D. MacKenzie, Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. Distributed Computing 16(4): 307-327 (2003) |
64 | EE | Philip D. MacKenzie, Michael K. Reiter: Networked cryptographic devices resilient to capture. Int. J. Inf. Sec. 2(1): 1-20 (2003) |
63 | EE | Dahlia Malkhi, Yishay Mansour, Michael K. Reiter: Diffusion without false rumors: on propagating updates in a Byzantine environment. Theor. Comput. Sci. 1-3(299): 289-306 (2003) |
2002 | ||
62 | EE | Yinglian Xie, David R. O'Hallaron, Michael K. Reiter: A Secure Distributed Search System. HPDC 2002: 321- |
61 | EE | Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih: Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296 |
60 | Pascal Felber, Michael K. Reiter: Advanced concurrency control in Java. Concurrency and Computation: Practice and Experience 14(4): 261-285 (2002) | |
59 | EE | Fabian Monrose, Michael K. Reiter, Susanne Wetzel: Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002) |
2001 | ||
58 | EE | Philip D. MacKenzie, Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. ACM Conference on Computer and Communications Security 2001: 10-19 |
57 | EE | Philip D. MacKenzie, Michael K. Reiter: Two-Party Generation of DSA Signatures. CRYPTO 2001: 137-154 |
56 | EE | Markus Jakobsson, Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12 |
55 | EE | Gregory Chockler, Dahlia Malkhi, Michael K. Reiter: Backoff Protocols for Distributed Mutual Exclusion and Ordering. ICDCS 2001: 11-20 |
54 | EE | Philip D. MacKenzie, Michael K. Reiter: Networked Cryptographic Devices Resilient to Capture. IEEE Symposium on Security and Privacy 2001: 12-25 |
53 | EE | Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel: Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001: 202-213 |
52 | EE | Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304 |
51 | EE | Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella: Efficient Update Diffusion in Byzantine Environments. SRDS 2001: 90-98 |
50 | EE | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001) |
49 | EE | Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter: On k-Set Consensus Problems in Asynchronous Systems. IEEE Trans. Parallel Distrib. Syst. 12(1): 7-21 (2001) |
48 | EE | Lorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter: Fault Detection for Byzantine Quorum Systems. IEEE Trans. Parallel Distrib. Syst. 12(9): 996-1007 (2001) |
47 | EE | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) |
2000 | ||
46 | EE | Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101 |
45 | EE | Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184 |
44 | EE | Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects Shared by Byzantine Processes. DISC 2000: 345-359 |
43 | EE | Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Dynamic Byzantine Quorum Systems. DSN 2000: 283- |
42 | EE | Dahlia Malkhi, Michael K. Reiter: An Architecture for Survivable Coordination in Large Distributed Systems. IEEE Trans. Knowl. Data Eng. 12(2): 187-202 (2000) |
41 | EE | Dahlia Malkhi, Michael K. Reiter: Secure Execution of Java Applets Using a Remote Playground. IEEE Trans. Software Eng. 26(12): 1197-1209 (2000) |
40 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) | |
1999 | ||
39 | EE | Fabian Monrose, Michael K. Reiter, Susanne Wetzel: Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999: 73-82 |
38 | EE | Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter: On k-Set Consensus Problems in Asynchronous Systems. PODC 1999: 257-265 |
37 | EE | Dahlia Malkhi, Yishay Mansour, Michael K. Reiter: On Diffusing Updates in a Byzantine Environment. SRDS 1999: 134-143 |
36 | EE | Michael K. Reiter, Stuart G. Stubblebine: Authentication Metric Analysis and Design. ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999) |
35 | EE | Dahlia Malkhi, Michael K. Reiter: Secure Execution of Java Applets using a Remote Playground CoRR cs.CR/9908009: (1999) |
34 | EE | Dahlia Malkhi, Yishay Mansour, Michael K. Reiter: On Propagating Updates in a Byzantine Environment CoRR cs.DC/9908010: (1999) |
33 | EE | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011: (1999) |
32 | EE | Michael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999) |
31 | EE | Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter: On the Security of Pay-per-Click and Other Web Advertising Schemes. Computer Networks 31(11-16): 1091-1100 (1999) |
30 | Michael K. Reiter: High-Confidence Distributed Systems - Guest Editor's Introduction. IEEE Internet Computing 3(6): 52-54 (1999) | |
1998 | ||
29 | EE | Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin: Secure Execution of Java Applets using a Remote Playground. IEEE Symposium on Security and Privacy 1998: 40-51 |
28 | EE | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321 |
27 | Dahlia Malkhi, Michael K. Reiter: Survivable Consensus Objects. SRDS 1998: 271-279 | |
26 | Dahlia Malkhi, Michael K. Reiter: Secure and Scalable Replication in Phalanx. SRDS 1998: 51-58 | |
25 | EE | Michael K. Reiter, Aviel D. Rubin: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) |
24 | EE | Dahlia Malkhi, Michael K. Reiter: Byzantine Quorum Systems. Distributed Computing 11(4): 203-213 (1998) |
23 | Michael K. Reiter, Stuart G. Stubblebine: Resilient Authentication Using Path Independence. IEEE Trans. Computers 47(12): 1351-1362 (1998) | |
1997 | ||
22 | EE | Matthew K. Franklin, Michael K. Reiter: Fair Exchange with a Semi-Trusted Third Party (extended abstract). ACM Conference on Computer and Communications Security 1997: 1-5 |
21 | EE | Michael K. Reiter, Stuart G. Stubblebine: Path Independence for Authentication in Large-Scale Systems. ACM Conference on Computer and Communications Security 1997: 57-66 |
20 | EE | Dahlia Malkhi, Michael K. Reiter: Unreliable Intrusion Detection in Distributed Computations. CSFW 1997: 116-125 |
19 | EE | Michael K. Reiter, Stuart G. Stubblebine: Toward Acceptable Metrics of Authentication. IEEE Symposium on Security and Privacy 1997: 10-20 |
18 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 | |
17 | Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Probabilistic Quorum Systems. PODC 1997: 267-273 | |
16 | EE | Dahlia Malkhi, Michael K. Reiter: Byzantine Quorum Systems. STOC 1997: 569-578 |
15 | Dahlia Malkhi, Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. Journal of Computer Security 5(2): 113-128 (1997) | |
1996 | ||
14 | EE | Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. ACM Conference on Computer and Communications Security 1996: 38-47 |
13 | EE | Dalia Malki, Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. CSFW 1996: 9-17 |
12 | EE | Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter: Low-Exponent RSA with Related Messages. EUROCRYPT 1996: 1-9 |
11 | Michael K. Reiter: Distributed Trust with the Rampart Toolkit. Commun. ACM 39(4): 71-74 (1996) | |
10 | EE | Michael K. Reiter: A Secure Group Membership Protocol. IEEE Trans. Software Eng. 22(1): 31-42 (1996) |
9 | EE | Matthew K. Franklin, Michael K. Reiter: The Design and Implementation of a Secure Auction Service. IEEE Trans. Software Eng. 22(5): 302-312 (1996) |
8 | Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. Journal of Computer Security 4(4): 267-288 (1996) | |
1995 | ||
7 | EE | Matthew K. Franklin, Michael K. Reiter: Verifiable Signature Sharing. EUROCRYPT 1995: 50-63 |
6 | Michael K. Reiter, Li Gong: Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995) | |
1994 | ||
5 | EE | Michael K. Reiter: Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. ACM Conference on Computer and Communications Security 1994: 68-80 |
4 | Michael K. Reiter: The Rampart Toolkit for Building High-Integrity Services. Dagstuhl Seminar on Distributed Systems 1994: 99-110 | |
3 | EE | Michael K. Reiter, Kenneth P. Birman, Robbert van Renesse: A Security Architecture for Fault-Toerant Systems. ACM Trans. Comput. Syst. 12(4): 340-371 (1994) |
2 | EE | Michael K. Reiter, Kenneth P. Birman: How to Securely Replicate Services. ACM Trans. Program. Lang. Syst. 16(3): 986-1009 (1994) |
1992 | ||
1 | Michael K. Reiter: Integrating Security in a Group Oriented Distributed System (Abstract). Operating Systems Review 26(2): 27 (1992) |