Michael K. Reiter

From MaRDI portal
(Redirected from Person:1854465)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The unique chain rule and its applications2024-07-17Paper
scientific article; zbMATH DE number 7774313 (Why is no real title available?)2023-12-08Paper
A linear logic of authorization and knowledge
Computer Security – ESORICS 2006
2022-03-09Paper
HotStuff
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing
2021-01-20Paper
Objects shared by Byzantine processes
Distributed Computing
2020-12-04Paper
Delegation of cryptographic servers for capture-resilient devices
Distributed Computing
2020-12-04Paper
Byzantine quorum systems2020-12-02Paper
Resilient authentication using path independence
IEEE Transactions on Computers
2018-07-09Paper
Probabilistic quorum systems
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
The load and availability of Byzantine quorum systems
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
On k -set consensus problems in asynchronous systems
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
2015-09-11Paper
Quorum placement in networks, minimizing network congestion
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
2015-03-10Paper
Quorum placement in networks to minimize access delays
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
2015-03-10Paper
Low-exponent RSA with related messages
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Verifying distributed erasure-coded data
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
2014-03-13Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
On Consistency of Encrypted Files
Lecture Notes in Computer Science
2008-09-09Paper
Probabilistic Opaque Quorum Systems
Lecture Notes in Computer Science
2008-09-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2087907 (Why is no real title available?)2004-08-11Paper
Diffusion without false rumors: On propagating updates in a Byzantine environment.
Theoretical Computer Science
2003-05-25Paper
Advanced concurrency control in Java
Concurrency and Computation: Practice and Experience
2003-02-04Paper
Probabilistic quorum systems
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1842489 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1696685 (Why is no real title available?)2002-01-28Paper
Password hardening based on keystroke dynamics
International Journal of Information Security
2002-01-01Paper
scientific article; zbMATH DE number 1676633 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1559572 (Why is no real title available?)2001-02-28Paper
The Load and Availability of Byzantine Quorum Systems
SIAM Journal on Computing
2000-10-18Paper


Research outcomes over time


This page was built for person: Michael K. Reiter