The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael K. Reiter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP]
    PODC, 1997, pp:249-257 [Conf]
  2. Dahlia Malkhi, Michael K. Reiter
    Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP]
    Distributed Computing, 1998, v:11, n:4, pp:203-213 [Journal]
  3. Michael K. Reiter, XiaoFeng Wang, Matthew Wright
    Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:378-392 [Conf]
  4. Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang
    Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:16-30 [Conf]
  5. Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann
    Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf]
  6. Matthew K. Franklin, Michael K. Reiter
    Fair Exchange with a Semi-Trusted Third Party (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:1-5 [Conf]
  7. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Gray-box extraction of execution graphs for anomaly detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:318-329 [Conf]
  8. Markus Jakobsson, Michael K. Reiter
    Discouraging Software Piracy Using Software Aging. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:1-12 [Conf]
  9. Philip D. MacKenzie, Alina Oprea, Michael K. Reiter
    Automatic generation of two-party computations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:210-219 [Conf]
  10. Philip D. MacKenzie, Michael K. Reiter
    Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:10-19 [Conf]
  11. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf]
  12. Michael K. Reiter
    Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:68-80 [Conf]
  13. XiaoFeng Wang, Michael K. Reiter
    Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf]
  14. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf]
  15. Michael K. Reiter, Stuart G. Stubblebine
    Path Independence for Authentication in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:57-66 [Conf]
  16. Michael K. Reiter, XiaoFeng Wang
    Fragile mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:227-235 [Conf]
  17. XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
    Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
  18. Philip D. MacKenzie, Michael K. Reiter
    Two-Party Generation of DSA Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:137-154 [Conf]
  19. Dahlia Malkhi, Michael K. Reiter
    Unreliable Intrusion Detection in Distributed Computations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:116-125 [Conf]
  20. Dalia Malki, Michael K. Reiter
    A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:9-17 [Conf]
  21. Michael K. Reiter
    The Rampart Toolkit for Building High-Integrity Services. [Citation Graph (0, 0)][DBLP]
    Dagstuhl Seminar on Distributed Systems, 1994, pp:99-110 [Conf]
  22. Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Dynamic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:283-0 [Conf]
  23. Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter
    Efficient Byzantine-Tolerant Erasure-Coded Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:135-144 [Conf]
  24. Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang
    A Multi-Resolution Approach forWorm Detection and Containment. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:189-198 [Conf]
  25. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:297-312 [Conf]
  26. Michael P. Collins, Michael K. Reiter
    Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:1-17 [Conf]
  27. Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter
    Low-Exponent RSA with Related Messages. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:1-9 [Conf]
  28. Matthew K. Franklin, Michael K. Reiter
    Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:50-63 [Conf]
  29. Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
    Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:251-265 [Conf]
  30. Yinglian Xie, David R. O'Hallaron, Michael K. Reiter
    A Secure Distributed Search System. [Citation Graph (0, 0)][DBLP]
    HPDC, 2002, pp:321-0 [Conf]
  31. Gregory Chockler, Dahlia Malkhi, Michael K. Reiter
    Backoff Protocols for Distributed Mutual Exclusion and Ordering. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:11-20 [Conf]
  32. Ginger Perng, Michael K. Reiter, Chenxi Wang
    M2: Multicasting Mixes for Efficient and Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:59- [Conf]
  33. Darren Davis, Fabian Monrose, Michael K. Reiter
    Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:532-545 [Conf]
  34. Michael K. Reiter
    Security by, and for, Converged Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:1- [Conf]
  35. Ginger Perng, Michael K. Reiter, Chenxi Wang
    Censorship Resistance Revisited. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:62-76 [Conf]
  36. Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
    Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:431-445 [Conf]
  37. Alina Oprea, Michael K. Reiter
    Space-Efficient Block Storage Integrity. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  38. Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright
    Selective private function evaluation with applications to private statistics. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:293-304 [Conf]
  39. Daniel Golovin, Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter
    Quorum placement in networks: minimizing network congestion. [Citation Graph (0, 0)][DBLP]
    PODC, 2006, pp:16-25 [Conf]
  40. Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter
    Quorum placement in networks to minimize access delays. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:87-96 [Conf]
  41. Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1997, pp:267-273 [Conf]
  42. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:321- [Conf]
  43. Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
    On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1999, pp:257-265 [Conf]
  44. Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang
    Seurat: A Pointillist Approach to Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:238-257 [Conf]
  45. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:63-81 [Conf]
  46. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:19-40 [Conf]
  47. Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter
    Privacy-preserving global customization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2000, pp:176-184 [Conf]
  48. Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie
    Fault-scalable Byzantine fault-tolerant services. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:59-74 [Conf]
  49. Michael P. Collins, Michael K. Reiter
    An Empirical Analysis of Target-Resident DoS Filters. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:103-114 [Conf]
  50. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf]
  51. Philip D. MacKenzie, Michael K. Reiter
    Networked Cryptographic Devices Resilient to Capture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:12-25 [Conf]
  52. Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
    Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf]
  53. Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter
    Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf]
  54. Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel
    Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf]
  55. Michael K. Reiter, Stuart G. Stubblebine
    Toward Acceptable Metrics of Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:10-20 [Conf]
  56. XiaoFeng Wang, Michael K. Reiter
    Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf]
  57. Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang
    Worm Origin Identification Using Random Moonwalks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:242-256 [Conf]
  58. Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri
    Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf]
  59. Michael Abd-El-Malek, Gregory R. Ganger, Michael K. Reiter, Jay J. Wylie, Garth R. Goodson
    Lazy Verification in Fault-Tolerant Distributed Storage Systems. [Citation Graph (0, 0)][DBLP]
    SRDS, 2005, pp:179-190 [Conf]
  60. Charles P. Fry, Michael K. Reiter
    Nested Objects in a Byzantine Quorum-Replicated System. [Citation Graph (0, 0)][DBLP]
    SRDS, 2004, pp:79-89 [Conf]
  61. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    On Diffusing Updates in a Byzantine Environment. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:134-143 [Conf]
  62. Dahlia Malkhi, Michael K. Reiter
    Secure and Scalable Replication in Phalanx. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:51-58 [Conf]
  63. Dahlia Malkhi, Michael K. Reiter
    Survivable Consensus Objects. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:271-279 [Conf]
  64. Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella
    Efficient Update Diffusion in Byzantine Environments. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:90-98 [Conf]
  65. Michael K. Reiter, Asad Samar, Chenxi Wang
    The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:339-348 [Conf]
  66. Michael K. Reiter, Asad Samar, Chenxi Wang
    Distributed Construction of a Fault-Tolerant Network from a Tree. [Citation Graph (0, 0)][DBLP]
    SRDS, 2005, pp:155-165 [Conf]
  67. XiaoFeng Wang, Michael K. Reiter
    WRAPS: Denial-of-Service Defense through Web Referrals. [Citation Graph (0, 0)][DBLP]
    SRDS, 2006, pp:51-60 [Conf]
  68. Dahlia Malkhi, Michael K. Reiter
    Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    STOC, 1997, pp:569-578 [Conf]
  69. Philip D. MacKenzie, Michael K. Reiter, Ke Yang
    Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:171-190 [Conf]
  70. Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
    Bump in the Ether: A Framework for Securing Sensitive User Input. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:185-198 [Conf]
  71. Darren Davis, Fabian Monrose, Michael K. Reiter
    On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:151-164 [Conf]
  72. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:103-118 [Conf]
  73. Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:283-296 [Conf]
  74. Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
    Objects Shared by Byzantine Processes. [Citation Graph (0, 0)][DBLP]
    DISC, 2000, pp:345-359 [Conf]
  75. Alina Oprea, Michael K. Reiter
    On Consistency of Encrypted Files. [Citation Graph (0, 0)][DBLP]
    DISC, 2006, pp:254-268 [Conf]
  76. Michael K. Reiter
    Distributed Trust with the Rampart Toolkit. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:4, pp:71-74 [Journal]
  77. Michael K. Reiter, Aviel D. Rubin
    Anonymous Web Transactions with Crowds. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:32-38 [Journal]
  78. Michael K. Reiter, Li Gong
    Securing Causal Relationships in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1995, v:38, n:8, pp:633-642 [Journal]
  79. Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter
    On the Security of Pay-per-Click and Other Web Advertising Schemes. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:11-16, pp:1091-1100 [Journal]
  80. Pascal Felber, Michael K. Reiter
    Advanced concurrency control in Java. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2002, v:14, n:4, pp:261-285 [Journal]
  81. Dahlia Malkhi, Michael K. Reiter
    Secure Execution of Java Applets using a Remote Playground [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  82. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    On Propagating Updates in a Byzantine Environment [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  83. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  84. Philip D. MacKenzie, Michael K. Reiter
    Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2003, v:16, n:4, pp:307-327 [Journal]
  85. Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
    Objects shared by Byzantine processes. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2003, v:16, n:1, pp:37-48 [Journal]
  86. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal]
  87. Philip D. MacKenzie, Michael K. Reiter
    Networked cryptographic devices resilient to capture. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:1-20 [Journal]
  88. Philip D. MacKenzie, Michael K. Reiter
    Two-party generation of DSA signatures. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:218-239 [Journal]
  89. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal]
  90. Michael K. Reiter
    High-Confidence Distributed Systems - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:6, pp:52-54 [Journal]
  91. Michael K. Reiter, Pankaj Rohatgi
    Homeland Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:6, pp:16-17 [Journal]
  92. Dahlia Malkhi, Michael K. Reiter
    A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:2, pp:113-128 [Journal]
  93. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:4, pp:267-288 [Journal]
  94. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal]
  95. Michael K. Reiter
    Integrating Security in a Group Oriented Distributed System (Abstract). [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1992, v:26, n:2, pp:27- [Journal]
  96. Michael K. Reiter, Stuart G. Stubblebine
    Resilient Authentication Using Path Independence. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:12, pp:1351-1362 [Journal]
  97. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    Diffusion without false rumors: on propagating updates in a Byzantine environment. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:299, pp:289-306 [Journal]
  98. Michael K. Reiter, Aviel D. Rubin
    Crowds: Anonymity for Web Transactions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:66-92 [Journal]
  99. Michael K. Reiter, Stuart G. Stubblebine
    Authentication Metric Analysis and Design. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:138-158 [Journal]
  100. Pierangela Samarati, Michael K. Reiter, Sushil Jajodia
    An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal]
  101. Dahlia Malkhi, Michael K. Reiter
    An Architecture for Survivable Coordination in Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:187-202 [Journal]
  102. Michael K. Reiter, Kenneth P. Birman, Robbert van Renesse
    A Security Architecture for Fault-Toerant Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1994, v:12, n:4, pp:340-371 [Journal]
  103. Michael K. Reiter, Kenneth P. Birman
    How to Securely Replicate Services. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:3, pp:986-1009 [Journal]
  104. Lorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter
    Fault Detection for Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:9, pp:996-1007 [Journal]
  105. Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
    On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:1, pp:7-21 [Journal]
  106. Matthew K. Franklin, Michael K. Reiter
    The Design and Implementation of a Secure Auction Service. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:302-312 [Journal]
  107. Dahlia Malkhi, Michael K. Reiter
    Secure Execution of Java Applets Using a Remote Playground. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:12, pp:1197-1209 [Journal]
  108. Michael K. Reiter
    A Secure Group Membership Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:31-42 [Journal]
  109. Yinglian Xie, Michael K. Reiter, David R. O'Hallaron
    Protecting Privacy in Key-Value Search Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:493-504 [Conf]
  110. Florian Oprea, Michael K. Reiter
    Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:409-418 [Conf]
  111. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:19-37 [Conf]
  112. Michael K. Reiter
    Trustworthy Services and the Biological Analogy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:1- [Conf]
  113. James Hendricks, Gregory R. Ganger, Michael K. Reiter
    Verifying distributed erasure-coded data. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:139-146 [Conf]
  114. M. Patrick Collins, Michael K. Reiter
    Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:276-295 [Conf]
  115. James Hendricks, Gregory R. Ganger, Michael K. Reiter
    Low-overhead byzantine fault-tolerant storage. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:73-86 [Conf]
  116. Michael G. Merideth, Michael K. Reiter
    Probabilistic Opaque Quorum Systems. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:403-419 [Conf]

  117. How low can you go?: recommendations for hardware-supported minimal TCB code execution. [Citation Graph (, )][DBLP]


  118. Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]


  119. Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP]


  120. False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP]


  121. A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP]


  122. Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP]


  123. Real life challenges in access-control management. [Citation Graph (, )][DBLP]


  124. Access control for home data sharing: evaluating social acceptability. [Citation Graph (, )][DBLP]


  125. Towards bounded wait-free PASIS. [Citation Graph (, )][DBLP]


  126. Traffic Aggregation for Malware Detection. [Citation Graph (, )][DBLP]


  127. Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. [Citation Graph (, )][DBLP]


  128. AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]


  129. Data Structures with Unpredictable Timing. [Citation Graph (, )][DBLP]


  130. Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. [Citation Graph (, )][DBLP]


  131. BinHunt: Automatically Finding Semantic Differences in Binary Programs. [Citation Graph (, )][DBLP]


  132. Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. [Citation Graph (, )][DBLP]


  133. Forensic Analysis for Epidemic Attacks in Federated Networks. [Citation Graph (, )][DBLP]


  134. Self-optimizing distributed trees. [Citation Graph (, )][DBLP]


  135. Consumable Credentials in Linear-Logic-Based Access-Control Systems. [Citation Graph (, )][DBLP]


  136. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. [Citation Graph (, )][DBLP]


  137. Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]


  138. Safe Passage for Passwords and Other Sensitive Data. [Citation Graph (, )][DBLP]


  139. cSamp: A System for Network-Wide Flow Monitoring. [Citation Graph (, )][DBLP]


  140. Write Markers for Probabilistic Quorum Systems. [Citation Graph (, )][DBLP]


  141. On the Limits of Payload-Oblivious Network Attack Detection. [Citation Graph (, )][DBLP]


  142. Automatically Adapting a Trained Anomaly Detector to Software Patches. [Citation Graph (, )][DBLP]


  143. On Challenges in Evaluating Malware Clustering. [Citation Graph (, )][DBLP]


  144. Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP]


  145. xDomain: cross-border proofs of access. [Citation Graph (, )][DBLP]


  146. Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP]


  147. The Practical Subtleties of Biometric Key Generation. [Citation Graph (, )][DBLP]


  148. Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP]


  149. Lessons learned from the deployment of a smartphone-based access-control system. [Citation Graph (, )][DBLP]


  150. Selected Results from the Latest Decade of Quorum Systems Research. [Citation Graph (, )][DBLP]


Search in 0.581secs, Finished in 0.588secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002