List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| The unique chain rule and its applications | 2024-07-17 | Paper |
| scientific article; zbMATH DE number 7774313 (Why is no real title available?) | 2023-12-08 | Paper |
| A linear logic of authorization and knowledge Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
| HotStuff Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing | 2021-01-20 | Paper |
| Objects shared by Byzantine processes Distributed Computing | 2020-12-04 | Paper |
| Delegation of cryptographic servers for capture-resilient devices Distributed Computing | 2020-12-04 | Paper |
| Byzantine quorum systems | 2020-12-02 | Paper |
| Resilient authentication using path independence IEEE Transactions on Computers | 2018-07-09 | Paper |
| Probabilistic quorum systems Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 | 2017-09-29 | Paper |
| The load and availability of Byzantine quorum systems Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 | 2017-09-29 | Paper |
| Selective private function evaluation with applications to private statistics Proceedings of the twentieth annual ACM symposium on Principles of distributed computing | 2016-03-04 | Paper |
| On k -set consensus problems in asynchronous systems Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing | 2015-09-11 | Paper |
| Quorum placement in networks, minimizing network congestion Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
| Quorum placement in networks to minimize access delays Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
| Low-exponent RSA with related messages Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
| Verifying distributed erasure-coded data Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing | 2014-03-13 | Paper |
| Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
| On Consistency of Encrypted Files Lecture Notes in Computer Science | 2008-09-09 | Paper |
| Probabilistic Opaque Quorum Systems Lecture Notes in Computer Science | 2008-09-02 | Paper |
| Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
| Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2087907 (Why is no real title available?) | 2004-08-11 | Paper |
| Diffusion without false rumors: On propagating updates in a Byzantine environment. Theoretical Computer Science | 2003-05-25 | Paper |
| Advanced concurrency control in Java Concurrency and Computation: Practice and Experience | 2003-02-04 | Paper |
| Probabilistic quorum systems Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1842489 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1696685 (Why is no real title available?) | 2002-01-28 | Paper |
| Password hardening based on keystroke dynamics International Journal of Information Security | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1676633 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1559572 (Why is no real title available?) | 2001-02-28 | Paper |
| The Load and Availability of Byzantine Quorum Systems SIAM Journal on Computing | 2000-10-18 | Paper |
Research outcomes over time
This page was built for person: Michael K. Reiter