Reliable communication over partially authenticated networks
From MaRDI portal
Publication:1292432
DOI10.1016/S0304-3975(98)00241-2zbMATH Open0916.68008OpenAlexW1999268372MaRDI QIDQ1292432FDOQ1292432
Authors: Matthew Franklin, Amos Beimel
Publication date: 21 June 1999
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0304-3975(98)00241-2
Recommendations
Cites Work
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Title not available (Why is that?)
- Tolerating a linear number of faults in networks of bounded degree
- Title not available (Why is that?)
- Title not available (Why is that?)
- Reaching Agreement in the Presence of Faults
- The Byzantine generals strike again
- Perfectly secure message transmission
- Title not available (Why is that?)
- Easy impossibility proofs for distributed consensus problems
- Fault Tolerance in Networks of Bounded Degree
Cited In (17)
- Learning the state of nature in repeated games with incomplete information and signals
- Secure communication over radio channels
- Efficient reliable communication over partially authenticated networks
- Title not available (Why is that?)
- On private computation in incomplete networks
- Efficient reliable communication over partially authenticated networks
- Almost-everywhere secure computation with edge corruptions
- Is information-theoretic topology-hiding computation possible?
- Probabilistic reliability and privacy of communication using multicast in general neighbor networks
- On exponential lower bound for protocols for reliable communication in networks
- Boosting the Efficiency of Byzantine-Tolerant Reliable Communication
- Must the communication graph of MPC protocols be an expander?
- Mechanism design and communication networks
- The impossibility of implementing reliable communication in the face of crashes
- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
- Communication on networks and strong reliability
- Secure computation without authentication
This page was built for publication: Reliable communication over partially authenticated networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1292432)