Search the dblp DataBase
Michael K. Reiter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP ] PODC, 1997, pp:249-257 [Conf ] Dahlia Malkhi , Michael K. Reiter Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP ] Distributed Computing, 1998, v:11, n:4, pp:203-213 [Journal ] Michael K. Reiter , XiaoFeng Wang , Matthew Wright Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:378-392 [Conf ] Lea Kissner , Alina Oprea , Michael K. Reiter , Dawn Xiaodong Song , Ke Yang Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:16-30 [Conf ] Carlisle M. Adams , Mike Burmester , Yvo Desmedt , Michael K. Reiter , Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf ] Matthew K. Franklin , Michael K. Reiter Fair Exchange with a Semi-Trusted Third Party (extended abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:1-5 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Gray-box extraction of execution graphs for anomaly detection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:318-329 [Conf ] Markus Jakobsson , Michael K. Reiter Discouraging Software Piracy Using Software Aging. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:1-12 [Conf ] Philip D. MacKenzie , Alina Oprea , Michael K. Reiter Automatic generation of two-party computations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:210-219 [Conf ] Philip D. MacKenzie , Michael K. Reiter Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:10-19 [Conf ] Fabian Monrose , Michael K. Reiter , Susanne Wetzel Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf ] Michael K. Reiter Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:68-80 [Conf ] XiaoFeng Wang , Michael K. Reiter Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf ] Michael K. Reiter , Matthew K. Franklin , John B. Lacy , Rebecca N. Wright The Omega Key Management Service. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf ] Michael K. Reiter , Stuart G. Stubblebine Path Independence for Authentication in Large-Scale Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:57-66 [Conf ] Michael K. Reiter , XiaoFeng Wang Fragile mixing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:227-235 [Conf ] XiaoFeng Wang , Zhuowei Li , Jun Xu , Michael K. Reiter , Chongkyung Kil , Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf ] Philip D. MacKenzie , Michael K. Reiter Two-Party Generation of DSA Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:137-154 [Conf ] Dahlia Malkhi , Michael K. Reiter Unreliable Intrusion Detection in Distributed Computations. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:116-125 [Conf ] Dalia Malki , Michael K. Reiter A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:9-17 [Conf ] Michael K. Reiter The Rampart Toolkit for Building High-Integrity Services. [Citation Graph (0, 0)][DBLP ] Dagstuhl Seminar on Distributed Systems, 1994, pp:99-110 [Conf ] Lorenzo Alvisi , Evelyn Tumlin Pierce , Dahlia Malkhi , Michael K. Reiter , Rebecca N. Wright Dynamic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:283-0 [Conf ] Garth R. Goodson , Jay J. Wylie , Gregory R. Ganger , Michael K. Reiter Efficient Byzantine-Tolerant Erasure-Coded Storage. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:135-144 [Conf ] Vyas Sekar , Yinglian Xie , Michael K. Reiter , Hui Zhang A Multi-Resolution Approach forWorm Detection and Containment. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:189-198 [Conf ] Deepak Garg , Lujo Bauer , Kevin D. Bowers , Frank Pfenning , Michael K. Reiter A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:297-312 [Conf ] Michael P. Collins , Michael K. Reiter Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:1-17 [Conf ] Don Coppersmith , Matthew K. Franklin , Jacques Patarin , Michael K. Reiter Low-Exponent RSA with Related Messages. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:1-9 [Conf ] Matthew K. Franklin , Michael K. Reiter Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:50-63 [Conf ] Brian Neil Levine , Michael K. Reiter , Chenxi Wang , Matthew Wright Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:251-265 [Conf ] Yinglian Xie , David R. O'Hallaron , Michael K. Reiter A Secure Distributed Search System. [Citation Graph (0, 0)][DBLP ] HPDC, 2002, pp:321-0 [Conf ] Gregory Chockler , Dahlia Malkhi , Michael K. Reiter Backoff Protocols for Distributed Mutual Exclusion and Ordering. [Citation Graph (0, 0)][DBLP ] ICDCS, 2001, pp:11-20 [Conf ] Ginger Perng , Michael K. Reiter , Chenxi Wang M2: Multicasting Mixes for Efficient and Anonymous Communication. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:59- [Conf ] Darren Davis , Fabian Monrose , Michael K. Reiter Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:532-545 [Conf ] Michael K. Reiter Security by, and for, Converged Mobile Devices. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:1- [Conf ] Ginger Perng , Michael K. Reiter , Chenxi Wang Censorship Resistance Revisited. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:62-76 [Conf ] Lujo Bauer , Scott Garriss , Jonathan M. McCune , Michael K. Reiter , Jason Rouse , Peter Rutenbar Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:431-445 [Conf ] Alina Oprea , Michael K. Reiter Space-Efficient Block Storage Integrity. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Ran Canetti , Yuval Ishai , Ravi Kumar , Michael K. Reiter , Ronitt Rubinfeld , Rebecca N. Wright Selective private function evaluation with applications to private statistics. [Citation Graph (0, 0)][DBLP ] PODC, 2001, pp:293-304 [Conf ] Daniel Golovin , Anupam Gupta , Bruce M. Maggs , Florian Oprea , Michael K. Reiter Quorum placement in networks: minimizing network congestion. [Citation Graph (0, 0)][DBLP ] PODC, 2006, pp:16-25 [Conf ] Anupam Gupta , Bruce M. Maggs , Florian Oprea , Michael K. Reiter Quorum placement in networks to minimize access delays. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:87-96 [Conf ] Dahlia Malkhi , Michael K. Reiter , Rebecca N. Wright Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP ] PODC, 1997, pp:267-273 [Conf ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool , Rebecca N. Wright Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:321- [Conf ] Roberto De Prisco , Dahlia Malkhi , Michael K. Reiter On k -Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP ] PODC, 1999, pp:257-265 [Conf ] Yinglian Xie , Hyang-Ah Kim , David R. O'Hallaron , Michael K. Reiter , Hui Zhang Seurat: A Pointillist Approach to Anomaly Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:238-257 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:63-81 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:19-40 [Conf ] Robert M. Arlein , Ben Jai , Markus Jakobsson , Fabian Monrose , Michael K. Reiter Privacy-preserving global customization. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2000, pp:176-184 [Conf ] Michael Abd-El-Malek , Gregory R. Ganger , Garth R. Goodson , Michael K. Reiter , Jay J. Wylie Fault-scalable Byzantine fault-tolerant services. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:59-74 [Conf ] Michael P. Collins , Michael K. Reiter An Empirical Analysis of Target-Resident DoS Filters. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:103-114 [Conf ] Lujo Bauer , Scott Garriss , Michael K. Reiter Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf ] Philip D. MacKenzie , Michael K. Reiter Networked Cryptographic Devices Resilient to Capture. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:12-25 [Conf ] Jonathan M. McCune , Adrian Perrig , Michael K. Reiter Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf ] Jonathan M. McCune , Elaine Shi , Adrian Perrig , Michael K. Reiter Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf ] Fabian Monrose , Michael K. Reiter , Qi Li , Susanne Wetzel Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf ] Michael K. Reiter , Stuart G. Stubblebine Toward Acceptable Metrics of Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:10-20 [Conf ] XiaoFeng Wang , Michael K. Reiter Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf ] Yinglian Xie , Vyas Sekar , David A. Maltz , Michael K. Reiter , Hui Zhang Worm Origin Identification Using Random Moonwalks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:242-256 [Conf ] Jonathan M. McCune , Bryan Parno , Adrian Perrig , Michael K. Reiter , Arvind Seshadri Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf ] Michael Abd-El-Malek , Gregory R. Ganger , Michael K. Reiter , Jay J. Wylie , Garth R. Goodson Lazy Verification in Fault-Tolerant Distributed Storage Systems. [Citation Graph (0, 0)][DBLP ] SRDS, 2005, pp:179-190 [Conf ] Charles P. Fry , Michael K. Reiter Nested Objects in a Byzantine Quorum-Replicated System. [Citation Graph (0, 0)][DBLP ] SRDS, 2004, pp:79-89 [Conf ] Dahlia Malkhi , Yishay Mansour , Michael K. Reiter On Diffusing Updates in a Byzantine Environment. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1999, pp:134-143 [Conf ] Dahlia Malkhi , Michael K. Reiter Secure and Scalable Replication in Phalanx. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:51-58 [Conf ] Dahlia Malkhi , Michael K. Reiter Survivable Consensus Objects. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:271-279 [Conf ] Dahlia Malkhi , Ohad Rodeh , Michael K. Reiter , Yaron Sella Efficient Update Diffusion in Byzantine Environments. [Citation Graph (0, 0)][DBLP ] SRDS, 2001, pp:90-98 [Conf ] Michael K. Reiter , Asad Samar , Chenxi Wang The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. [Citation Graph (0, 0)][DBLP ] SRDS, 2003, pp:339-348 [Conf ] Michael K. Reiter , Asad Samar , Chenxi Wang Distributed Construction of a Fault-Tolerant Network from a Tree. [Citation Graph (0, 0)][DBLP ] SRDS, 2005, pp:155-165 [Conf ] XiaoFeng Wang , Michael K. Reiter WRAPS: Denial-of-Service Defense through Web Referrals. [Citation Graph (0, 0)][DBLP ] SRDS, 2006, pp:51-60 [Conf ] Dahlia Malkhi , Michael K. Reiter Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] STOC, 1997, pp:569-578 [Conf ] Philip D. MacKenzie , Michael K. Reiter , Ke Yang Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:171-190 [Conf ] Jonathan M. McCune , Adrian Perrig , Michael K. Reiter Bump in the Ether: A Framework for Securing Sensitive User Input. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:185-198 [Conf ] Darren Davis , Fabian Monrose , Michael K. Reiter On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:151-164 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:103-118 [Conf ] Fabian Monrose , Michael K. Reiter , Qi Li , Daniel P. Lopresti , Chilin Shih Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:283-296 [Conf ] Dahlia Malkhi , Michael Merritt , Michael K. Reiter , Gadi Taubenfeld Objects Shared by Byzantine Processes. [Citation Graph (0, 0)][DBLP ] DISC, 2000, pp:345-359 [Conf ] Alina Oprea , Michael K. Reiter On Consistency of Encrypted Files. [Citation Graph (0, 0)][DBLP ] DISC, 2006, pp:254-268 [Conf ] Michael K. Reiter Distributed Trust with the Rampart Toolkit. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:4, pp:71-74 [Journal ] Michael K. Reiter , Aviel D. Rubin Anonymous Web Transactions with Crowds. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:2, pp:32-38 [Journal ] Michael K. Reiter , Li Gong Securing Causal Relationships in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Comput. J., 1995, v:38, n:8, pp:633-642 [Journal ] Vinod Anupam , Alain J. Mayer , Kobbi Nissim , Benny Pinkas , Michael K. Reiter On the Security of Pay-per-Click and Other Web Advertising Schemes. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:11-16, pp:1091-1100 [Journal ] Pascal Felber , Michael K. Reiter Advanced concurrency control in Java. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2002, v:14, n:4, pp:261-285 [Journal ] Dahlia Malkhi , Michael K. Reiter Secure Execution of Java Applets using a Remote Playground [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Dahlia Malkhi , Yishay Mansour , Michael K. Reiter On Propagating Updates in a Byzantine Environment [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Philip D. MacKenzie , Michael K. Reiter Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2003, v:16, n:4, pp:307-327 [Journal ] Dahlia Malkhi , Michael Merritt , Michael K. Reiter , Gadi Taubenfeld Objects shared by Byzantine processes. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2003, v:16, n:1, pp:37-48 [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool , Rebecca N. Wright Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal ] Philip D. MacKenzie , Michael K. Reiter Networked cryptographic devices resilient to capture. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:2, n:1, pp:1-20 [Journal ] Philip D. MacKenzie , Michael K. Reiter Two-party generation of DSA signatures. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:218-239 [Journal ] Fabian Monrose , Michael K. Reiter , Susanne Wetzel Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal ] Michael K. Reiter High-Confidence Distributed Systems - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1999, v:3, n:6, pp:52-54 [Journal ] Michael K. Reiter , Pankaj Rohatgi Homeland Security. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2004, v:8, n:6, pp:16-17 [Journal ] Dahlia Malkhi , Michael K. Reiter A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:2, pp:113-128 [Journal ] Michael K. Reiter , Matthew K. Franklin , John B. Lacy , Rebecca N. Wright The Omega Key Management Service. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:4, pp:267-288 [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal ] Michael K. Reiter Integrating Security in a Group Oriented Distributed System (Abstract). [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1992, v:26, n:2, pp:27- [Journal ] Michael K. Reiter , Stuart G. Stubblebine Resilient Authentication Using Path Independence. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:12, pp:1351-1362 [Journal ] Dahlia Malkhi , Yishay Mansour , Michael K. Reiter Diffusion without false rumors: on propagating updates in a Byzantine environment. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:1, n:299, pp:289-306 [Journal ] Michael K. Reiter , Aviel D. Rubin Crowds: Anonymity for Web Transactions. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:66-92 [Journal ] Michael K. Reiter , Stuart G. Stubblebine Authentication Metric Analysis and Design. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:138-158 [Journal ] Pierangela Samarati , Michael K. Reiter , Sushil Jajodia An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal ] Dahlia Malkhi , Michael K. Reiter An Architecture for Survivable Coordination in Large Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:187-202 [Journal ] Michael K. Reiter , Kenneth P. Birman , Robbert van Renesse A Security Architecture for Fault-Toerant Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1994, v:12, n:4, pp:340-371 [Journal ] Michael K. Reiter , Kenneth P. Birman How to Securely Replicate Services. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1994, v:16, n:3, pp:986-1009 [Journal ] Lorenzo Alvisi , Dahlia Malkhi , Evelyn Tumlin Pierce , Michael K. Reiter Fault Detection for Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:9, pp:996-1007 [Journal ] Roberto De Prisco , Dahlia Malkhi , Michael K. Reiter On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:1, pp:7-21 [Journal ] Matthew K. Franklin , Michael K. Reiter The Design and Implementation of a Secure Auction Service. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:302-312 [Journal ] Dahlia Malkhi , Michael K. Reiter Secure Execution of Java Applets Using a Remote Playground. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:12, pp:1197-1209 [Journal ] Michael K. Reiter A Secure Group Membership Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:31-42 [Journal ] Yinglian Xie , Michael K. Reiter , David R. O'Hallaron Protecting Privacy in Key-Value Search Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:493-504 [Conf ] Florian Oprea , Michael K. Reiter Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:409-418 [Conf ] Lujo Bauer , Scott Garriss , Michael K. Reiter Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:19-37 [Conf ] Michael K. Reiter Trustworthy Services and the Biological Analogy. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:1- [Conf ] James Hendricks , Gregory R. Ganger , Michael K. Reiter Verifying distributed erasure-coded data. [Citation Graph (0, 0)][DBLP ] PODC, 2007, pp:139-146 [Conf ] M. Patrick Collins , Michael K. Reiter Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:276-295 [Conf ] James Hendricks , Gregory R. Ganger , Michael K. Reiter Low-overhead byzantine fault-tolerant storage. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:73-86 [Conf ] Michael G. Merideth , Michael K. Reiter Probabilistic Opaque Quorum Systems. [Citation Graph (0, 0)][DBLP ] DISC, 2007, pp:403-419 [Conf ] How low can you go?: recommendations for hardware-supported minimal TCB code execution. [Citation Graph (, )][DBLP ] Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP ] Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP ] False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP ] A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP ] Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP ] Real life challenges in access-control management. [Citation Graph (, )][DBLP ] Access control for home data sharing: evaluating social acceptability. [Citation Graph (, )][DBLP ] Towards bounded wait-free PASIS. [Citation Graph (, )][DBLP ] Traffic Aggregation for Malware Detection. [Citation Graph (, )][DBLP ] Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. [Citation Graph (, )][DBLP ] AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP ] Data Structures with Unpredictable Timing. [Citation Graph (, )][DBLP ] Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. [Citation Graph (, )][DBLP ] BinHunt: Automatically Finding Semantic Differences in Binary Programs. [Citation Graph (, )][DBLP ] Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. [Citation Graph (, )][DBLP ] Forensic Analysis for Epidemic Attacks in Federated Networks. [Citation Graph (, )][DBLP ] Self-optimizing distributed trees. [Citation Graph (, )][DBLP ] Consumable Credentials in Linear-Logic-Based Access-Control Systems. [Citation Graph (, )][DBLP ] Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. [Citation Graph (, )][DBLP ] Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP ] Safe Passage for Passwords and Other Sensitive Data. [Citation Graph (, )][DBLP ] cSamp: A System for Network-Wide Flow Monitoring. [Citation Graph (, )][DBLP ] Write Markers for Probabilistic Quorum Systems. [Citation Graph (, )][DBLP ] On the Limits of Payload-Oblivious Network Attack Detection. [Citation Graph (, )][DBLP ] Automatically Adapting a Trained Anomaly Detector to Software Patches. [Citation Graph (, )][DBLP ] On Challenges in Evaluating Malware Clustering. [Citation Graph (, )][DBLP ] Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP ] xDomain: cross-border proofs of access. [Citation Graph (, )][DBLP ] Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP ] The Practical Subtleties of Biometric Key Generation. [Citation Graph (, )][DBLP ] Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP ] Lessons learned from the deployment of a smartphone-based access-control system. [Citation Graph (, )][DBLP ] Selected Results from the Latest Decade of Quorum Systems Research. [Citation Graph (, )][DBLP ] Search in 0.033secs, Finished in 0.038secs