sort by
approximate search
1shortlisttitle datasearch history  
results search [or] ISN:0000000043108426 | 1 hits
Person
ISNI: 
0000 0000 4310 8426
Name: 
Reiter, M. K.
Reiter, Michael
Reiter, Michael K.
Creation class: 
article
txt
Creation role: 
author
Related names: 
Cornell University
Titles: 
Advanced concurrency control in Java
Anonymous Web transactions with crowds
architecture for survivable coordination in large distributed systems, An
Authentication metric analysis and design
authorization model for a public key management service, An
Automatic generation of two-party computations
Backoff protocols for distributed mutual exclusion and ordering
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance
Cryptographic key generation from voice
Decentralized storage consistency via versioning servers.
Delegation of cryptographic servers for capture-resilient devices
design and implementation of a secure auction service, The
Device-enabled authorization in the grey system.
Diffusion without false rumors: on propagating updates in a Byzantine environment
Distributing trust with the Rampart toolkit
Efficient update diffusion in Byzantine environments
Fair exchange with a semi-trusted third party (extended abstract)
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
Fault detection for Byzantine quorum systems
Fault-scalable Byzantine fault-tolerant services
Fragile mixing
Generation of repeatable cryptographic key based on varying parameters
Gray-box extraction of execution graphs for anomaly detection
High-throughput secure reliable multicast protocol
How to securely replicate services, 1992:
Integrating security in a group oriented distributed system.
Issues and mechanisms for trustworthy systems: Creating transparent mistrust
Lessons learned from the deployment of a smartphone-based access-control system
load and availability of Byzantine quorum systems, The
Low-overhead byzantine fault-tolerant storage
Methods and apparatus for providing privacy-preserving global customization
Mitigating bandwidth-exhaustion attacks using congestion puzzles
multi-layer framework for puzzle-based denial-of-service defense, A
Networked cryptographic devices resilient to capture
Objects shared by Byzantine processes*
Omega key management service, The
On diffusing updates in a Byzantine environment
On k-set consensus problems in asynchronous systems
On the security of pay-per-click and other Web advertising schemes
Packet vaccine:black-box exploit detection and signature generation
Password hardening based on keystroke dynamics
Path independence for authentication in large-scale systems
Privacy-preserving global customization
Probabilistic Byzantine quorum systems
Quorum placement in networks:minimizing network congestion
Quorum placement in networks to minimize access delays
Resilient authentication using path independence
Secure agreement protocols:reliable and atomic group multicast in rampart
Secure and scalable replication in Phalanx
Secure Distributed Search System, A
Secure execution of Java applets using a remote playground
secure group membership protocol, A
security architecture for fault-tolerant systems, A
Seeing-Is-Believing: using camera phones for human-verifiable authentication
Selective private function evaluation with applications to private statistics
Survivable consensus objects
Toward acceptable metrics of authentication
Two-party generation of DSA signatures
Unreliable intrusion detection in distributed computations
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats
Verifying distributed erasure-coded data
Contributed to or performed: 
COMMUNICATIONS- ACM
IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING SE
Notes: 
"July 1993."
Thesis (Ph. D.)--Cornell University, 1993
Sources: 
ZETO