Search dblp for Publications

export results for "toc:db/conf/dimacs/dimacs2.bht:"

 download as .bib file

@proceedings{DBLP:conf/dimacs/dimacs2,
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  publisher    = {{DIMACS/AMS}},
  year         = {1991},
  url          = {https://doi.org/10.1090/dimacs/002},
  doi          = {10.1090/DIMACS/002},
  isbn         = {978-0-8218-6590-3},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/dimacs2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Beaver89,
  author       = {Donald Beaver},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Formal Definitions for Secure Distributed Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {47--64},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/02},
  doi          = {10.1090/DIMACS/002/02},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Beaver89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Beaver89a,
  author       = {Donald Beaver},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Perfect Privacy For Two-Party Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {65--78},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/03},
  doi          = {10.1090/DIMACS/002/03},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Beaver89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BellareCG89,
  author       = {Mihir Bellare and
                  Lenore Cowen and
                  Shafi Goldwasser},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {On the Structure of Secret Key Exchange Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {79--92},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/04},
  doi          = {10.1090/DIMACS/002/04},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BellareCG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Bishop89,
  author       = {Matt Bishop},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Privacy-Enhanced Electronic Mail},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {93--106},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/05},
  doi          = {10.1090/DIMACS/002/05},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Bishop89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BlumLR89,
  author       = {Manuel Blum and
                  Michael Luby and
                  Ronitt Rubinfeld},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Program Result Checking against Adaptive Programs and in Cryptographic
                  Settings},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {107--118},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/06},
  doi          = {10.1090/DIMACS/002/06},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BlumLR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurrowsAN89,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {The Scope of a Logic of Authentication},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {119--126},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/07},
  doi          = {10.1090/DIMACS/002/07},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/EstrinT89,
  author       = {Deborah Estrin and
                  Gene Tsudik},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Secure Policy Enforcement in Internetworks},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {127--154},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/08},
  doi          = {10.1090/DIMACS/002/08},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/EstrinT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigeS89,
  author       = {Uriel Feige and
                  Adi Shamir},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {On Expected Polynomial Time Simulation of Zero Knowledge Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {155--160},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/09},
  doi          = {10.1090/DIMACS/002/09},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FeigeS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigenbaumLW89,
  author       = {Joan Feigenbaum and
                  Mark Y. Liberman and
                  Rebecca N. Wright},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Cryptographic Protection of Databases and Software},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {161--172},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/10},
  doi          = {10.1090/DIMACS/002/10},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FeigenbaumLW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigenbaumM89,
  author       = {Joan Feigenbaum and
                  Michael Merritt},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Open Questions, Talk Abstracts, and Summary of Discussions},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {1--46},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/01},
  doi          = {10.1090/DIMACS/002/01},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FeigenbaumM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FischerPR89,
  author       = {Michael J. Fischer and
                  Michael S. Paterson and
                  Charles Rackoff},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Secret Bit Transmission Using a Random Deal of Cards},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {173--182},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/11},
  doi          = {10.1090/DIMACS/002/11},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FischerPR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/GalilHY89,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Security against Replay Chosen-Ciphertext Attack},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {183--190},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/12},
  doi          = {10.1090/DIMACS/002/12},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/GalilHY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Lipton89,
  author       = {Richard J. Lipton},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {New Directions In Testing},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {191--202},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/13},
  doi          = {10.1090/DIMACS/002/13},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Lipton89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Merritt89,
  author       = {Michael Merritt},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Towards a Theory of Cryptographic Systems: {A} Critique of Crypto-Complexity},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {203--212},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/14},
  doi          = {10.1090/DIMACS/002/14},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Merritt89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Orlitsky89,
  author       = {Alon Orlitsky},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Feeback in Discrete Communication},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {213--228},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/15},
  doi          = {10.1090/DIMACS/002/15},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Orlitsky89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/OstrovskyY89,
  author       = {Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {On Necessary Conditions for Secure Distributed Computation},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {229--234},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/16},
  doi          = {10.1090/DIMACS/002/16},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/OstrovskyY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Reeds89,
  author       = {Jim Reeds},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Secure {IX} Network},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {235--244},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/17},
  doi          = {10.1090/DIMACS/002/17},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Reeds89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/ToussaintW89,
  author       = {Marie{-}Jeanne Toussaint and
                  Pierre Wolper},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Reasoning about Cryptographic Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {245},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/18},
  doi          = {10.1090/DIMACS/002/18},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/ToussaintW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/X89,
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Preface},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {vii--viii},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  timestamp    = {Wed, 13 Jan 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimacs/X89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/X89a,
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Foreword},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {ix},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  timestamp    = {Wed, 13 Jan 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimacs/X89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics