Author of the publication

Authentic Re-Publication by Untrusted Servers: A Novel Approach to Database Survivability

, , , , and . 3rd Information Survivability Workshop (ISW-2000), (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*, and . Journal of cryptology, 15 (2): 103--127 (2002)Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, and . Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Springer-Verlag, (July 2009)The round complexity of secure protocols, , and . Proceedings of the twenty-second annual ACM symposium on Theory of computing, page 503--513. New York, NY, USA, ACM, (1990)Authentic Re-Publication by Untrusted Servers: A Novel Approach to Database Survivability, , , , and . 3rd Information Survivability Workshop (ISW-2000), (2000)