default search action
Search dblp for Publications
export results for "toc:db/conf/dimacs/dimacs2.bht:"
@proceedings{DBLP:conf/dimacs/dimacs2, editor = {Joan Feigenbaum and Michael Merritt}, title = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, publisher = {{DIMACS/AMS}}, year = {1991}, url = {https://doi.org/10.1090/dimacs/002}, doi = {10.1090/DIMACS/002}, isbn = {978-0-8218-6590-3}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/dimacs2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Beaver89, author = {Donald Beaver}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Formal Definitions for Secure Distributed Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {47--64}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/02}, doi = {10.1090/DIMACS/002/02}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Beaver89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Beaver89a, author = {Donald Beaver}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Perfect Privacy For Two-Party Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {65--78}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/03}, doi = {10.1090/DIMACS/002/03}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Beaver89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BellareCG89, author = {Mihir Bellare and Lenore Cowen and Shafi Goldwasser}, editor = {Joan Feigenbaum and Michael Merritt}, title = {On the Structure of Secret Key Exchange Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {79--92}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/04}, doi = {10.1090/DIMACS/002/04}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BellareCG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Bishop89, author = {Matt Bishop}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Privacy-Enhanced Electronic Mail}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {93--106}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/05}, doi = {10.1090/DIMACS/002/05}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Bishop89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BlumLR89, author = {Manuel Blum and Michael Luby and Ronitt Rubinfeld}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Program Result Checking against Adaptive Programs and in Cryptographic Settings}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {107--118}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/06}, doi = {10.1090/DIMACS/002/06}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BlumLR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BurrowsAN89, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Joan Feigenbaum and Michael Merritt}, title = {The Scope of a Logic of Authentication}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {119--126}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/07}, doi = {10.1090/DIMACS/002/07}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/EstrinT89, author = {Deborah Estrin and Gene Tsudik}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Secure Policy Enforcement in Internetworks}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {127--154}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/08}, doi = {10.1090/DIMACS/002/08}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/EstrinT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FeigeS89, author = {Uriel Feige and Adi Shamir}, editor = {Joan Feigenbaum and Michael Merritt}, title = {On Expected Polynomial Time Simulation of Zero Knowledge Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {155--160}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/09}, doi = {10.1090/DIMACS/002/09}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FeigeS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FeigenbaumLW89, author = {Joan Feigenbaum and Mark Y. Liberman and Rebecca N. Wright}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Cryptographic Protection of Databases and Software}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {161--172}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/10}, doi = {10.1090/DIMACS/002/10}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FeigenbaumLW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FeigenbaumM89, author = {Joan Feigenbaum and Michael Merritt}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Open Questions, Talk Abstracts, and Summary of Discussions}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {1--46}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/01}, doi = {10.1090/DIMACS/002/01}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FeigenbaumM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FischerPR89, author = {Michael J. Fischer and Michael S. Paterson and Charles Rackoff}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Secret Bit Transmission Using a Random Deal of Cards}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {173--182}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/11}, doi = {10.1090/DIMACS/002/11}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FischerPR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/GalilHY89, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Security against Replay Chosen-Ciphertext Attack}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {183--190}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/12}, doi = {10.1090/DIMACS/002/12}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/GalilHY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Lipton89, author = {Richard J. Lipton}, editor = {Joan Feigenbaum and Michael Merritt}, title = {New Directions In Testing}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {191--202}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/13}, doi = {10.1090/DIMACS/002/13}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Lipton89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Merritt89, author = {Michael Merritt}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Towards a Theory of Cryptographic Systems: {A} Critique of Crypto-Complexity}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {203--212}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/14}, doi = {10.1090/DIMACS/002/14}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Merritt89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Orlitsky89, author = {Alon Orlitsky}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Feeback in Discrete Communication}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {213--228}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/15}, doi = {10.1090/DIMACS/002/15}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Orlitsky89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/OstrovskyY89, author = {Rafail Ostrovsky and Moti Yung}, editor = {Joan Feigenbaum and Michael Merritt}, title = {On Necessary Conditions for Secure Distributed Computation}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {229--234}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/16}, doi = {10.1090/DIMACS/002/16}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/OstrovskyY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Reeds89, author = {Jim Reeds}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Secure {IX} Network}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {235--244}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/17}, doi = {10.1090/DIMACS/002/17}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Reeds89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/ToussaintW89, author = {Marie{-}Jeanne Toussaint and Pierre Wolper}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Reasoning about Cryptographic Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {245}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/18}, doi = {10.1090/DIMACS/002/18}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/ToussaintW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/X89, editor = {Joan Feigenbaum and Michael Merritt}, title = {Preface}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {vii--viii}, publisher = {{DIMACS/AMS}}, year = {1989}, timestamp = {Wed, 13 Jan 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimacs/X89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/X89a, editor = {Joan Feigenbaum and Michael Merritt}, title = {Foreword}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {ix}, publisher = {{DIMACS/AMS}}, year = {1989}, timestamp = {Wed, 13 Jan 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimacs/X89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.