Welcome to D
SIGMOD 2004
PODS 2004
SIGMOD RECOR
CIKM 2004
DASFAA 2004
DBPL 2003
DE-BULLETIN
DEBS 2004
DMKD 2004
DMSN 2004
DOLAP 2004
DPDJ 2004
EDBT 2004
ER 2003
GIS 2004
HDP 2004
HYPERTEXT 20
ICDE 2004
ICDT 2003
JCDL 2004
MDM
MIR 2004
MIS 2004
MMDB 2004
MOBIDE 2003
RIDE 2004
SBBD 2003
SIGIR FORUM
SIGIR 2004
SIGKDD EXPLO
SIGKDD 2004
SSDBM 2004
SSTD 2003
TIME 2004
TODS 2004
VLDB 2004
VLDB Journal
WEBDB 2004
WIDM 2004
XIME-P 2004
Footer

Michael K. Reiter

Papers on DiSC'04


Providing content-based services in a peer-to-peer environment

Publications


Note: Links lead to the DBLP on the Web.

Michael K. Reiter

Michael K. Reiter, XiaoFeng Wang , Matthew Wright : Building Reliable Mix Networks with Fair Exchange. ACNS 2005 : 378-392

Michael K. Reiter, XiaoFeng Wang : Fragile mixing. ACM Conference on Computer and Communications Security 2004 : 227-235

XiaoFeng Wang , Michael K. Reiter: Mitigating bandwidth-exhaustion attacks using congestion puzzles. ACM Conference on Computer and Communications Security 2004 : 257-267

Debin Gao , Michael K. Reiter, Dawn Xiaodong Song : Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004 : 318-329

Lea Kissner , Alina Oprea , Michael K. Reiter, Dawn Xiaodong Song , Ke Yang : Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004 : 16-30

Garth R. Goodson , Jay J. Wylie , Gregory R. Ganger , Michael K. Reiter: Efficient Byzantine-Tolerant Erasure-Coded Storage. DSN 2004 : 135-144

Brian Neil Levine , Michael K. Reiter, Chenxi Wang , Matthew Wright : Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004 : 251-265

Darren Davis , Fabian Monrose , Michael K. Reiter: Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004 : 532-545

Michael K. Reiter: Security by, and for, Converged Mobile Devices. ICISC 2004 : 1

Michael Collins , Michael K. Reiter: An Empirical Analysis of Target-Resident DoS Filters. IEEE Symposium on Security and Privacy 2004 : 103-114

Yinglian Xie , Hyang-Ah Kim , David R. O'Hallaron , Michael K. Reiter, Hui Zhang : Seurat: A Pointillist Approach to Anomaly Detection. RAID 2004 : 238-257

Charles P. Fry , Michael K. Reiter: Nested Objects in a Byzantine Quorum-Replicated System. SRDS 2004 : 79-89

Philip D. MacKenzie , Michael K. Reiter, Ke Yang : Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). TCC 2004 : 171-190

Debin Gao , Michael K. Reiter, Dawn Xiaodong Song : On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004 : 103-118

Darren Davis , Fabian Monrose , Michael K. Reiter: On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004 : 151-164

Philip D. MacKenzie , Michael K. Reiter: Two-party generation of DSA signatures. Int. J. Inf. Sec. 2 (3-4): 218-239 (2004)

Philip D. MacKenzie , Alina Oprea , Michael K. Reiter: Automatic generation of two-party computations. ACM Conference on Computer and Communications Security 2003 : 210-219

XiaoFeng Wang , Michael K. Reiter: Defending Against Denial-of-Service Attacks with Puzzle Auction. IEEE Symposium on Security and Privacy 2003 : 78-92

Michael K. Reiter, Asad Samar , Chenxi Wang : The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003 : 339-348

Dahlia Malkhi , Michael Merritt , Michael K. Reiter, Gadi Taubenfeld : Objects shared by Byzantine processes. Distributed Computing 16 (1): 37-48 (2003)

Philip D. MacKenzie , Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. Distributed Computing 16 (4): 307-327 (2003)

Philip D. MacKenzie , Michael K. Reiter: Networked cryptographic devices resilient to capture. Int. J. Inf. Sec. 2 (1): 1-20 (2003)

Dahlia Malkhi , Yishay Mansour , Michael K. Reiter: Diffusion without false rumors: on propagating updates in a Byzantine environment. Theor. Comput. Sci. 1-3 (299): 289-306 (2003)

Yinglian Xie , David R. O'Hallaron , Michael K. Reiter: A Secure Distributed Search System. HPDC 2002 : 321-

Fabian Monrose , Michael K. Reiter, Qi Li , Daniel P. Lopresti , Chilin Shih : Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002 : 283-296

Pascal Felber , Michael K. Reiter: Advanced concurrency control in Java. Concurrency and Computation: Practice and Experience 14 (4): 261-285 (2002)

Fabian Monrose , Michael K. Reiter, Susanne Wetzel : Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1 (2): 69-83 (2002)

Philip D. MacKenzie , Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. ACM Conference on Computer and Communications Security 2001 : 10-19

Philip D. MacKenzie , Michael K. Reiter: Two-Party Generation of DSA Signatures. CRYPTO 2001 : 137-154

Markus Jakobsson , Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001 : 1-12

Gregory Chockler , Dahlia Malkhi , Michael K. Reiter: Backoff Protocols for Distributed Mutual Exclusion and Ordering. ICDCS 2001 : 11-20

Philip D. MacKenzie , Michael K. Reiter: Networked Cryptographic Devices Resilient to Capture. IEEE Symposium on Security and Privacy 2001 : 12-25

Fabian Monrose , Michael K. Reiter, Qi Li , Susanne Wetzel : Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001 : 202-213

Ran Canetti , Yuval Ishai , Ravi Kumar , Michael K. Reiter, Ronitt Rubinfeld , Rebecca N. Wright : Selective private function evaluation with applications to private statistics. PODC 2001 : 293-304

Dahlia Malkhi , Ohad Rodeh , Michael K. Reiter, Yaron Sella : Efficient Update Diffusion in Byzantine Environments. SRDS 2001 : 90-98

Pierangela Samarati , Michael K. Reiter, Sushil Jajodia : An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4 (4): 453-482 (2001)

Roberto De Prisco , Dahlia Malkhi , Michael K. Reiter: On k-Set Consensus Problems in Asynchronous Systems. IEEE Trans. Parallel Distrib. Syst. 12 (1): 7-21 (2001)

Lorenzo Alvisi , Dahlia Malkhi , Evelyn Tumlin Pierce , Michael K. Reiter: Fault Detection for Byzantine Quorum Systems. IEEE Trans. Parallel Distrib. Syst. 12 (9): 996-1007 (2001)

Dahlia Malkhi , Michael K. Reiter, Avishai Wool , Rebecca N. Wright : Probabilistic Quorum Systems. Inf. Comput. 170 (2): 184-206 (2001)

Carlisle M. Adams , Mike Burmester , Yvo Desmedt , Michael K. Reiter, Philip Zimmermann : Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000 : 98-101

Robert M. Arlein , Ben Jai , Markus Jakobsson , Fabian Monrose , Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000 : 176-184

Dahlia Malkhi , Michael Merritt , Michael K. Reiter, Gadi Taubenfeld : Objects Shared by Byzantine Processes. DISC 2000 : 345-359

Lorenzo Alvisi , Evelyn Tumlin Pierce , Dahlia Malkhi , Michael K. Reiter, Rebecca N. Wright : Dynamic Byzantine Quorum Systems. DSN 2000 : 283-

Dahlia Malkhi , Michael K. Reiter: An Architecture for Survivable Coordination in Large Distributed Systems. IEEE Trans. Knowl. Data Eng. 12 (2): 187-202 (2000)

Dahlia Malkhi , Michael K. Reiter: Secure Execution of Java Applets Using a Remote Playground. IEEE Trans. Software Eng. 26 (12): 1197-1209 (2000)

Dahlia Malkhi , Michael K. Reiter, Avishai Wool : The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29 (6): 1889-1906 (2000)

Fabian Monrose , Michael K. Reiter, Susanne Wetzel : Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999 : 73-82

Roberto De Prisco , Dahlia Malkhi , Michael K. Reiter: On k -Set Consensus Problems in Asynchronous Systems. PODC 1999 : 257-265

Dahlia Malkhi , Yishay Mansour , Michael K. Reiter: On Diffusing Updates in a Byzantine Environment. Symposium on Reliable Distributed Systems 1999 : 134-143

Michael K. Reiter, Stuart G. Stubblebine : Authentication Metric Analysis and Design. ACM Trans. Inf. Syst. Secur. 2 (2): 138-158 (1999)

Dahlia Malkhi , Michael K. Reiter: Secure Execution of Java Applets using a Remote Playground CoRR cs.CR/9908009 : (1999)

Dahlia Malkhi , Yishay Mansour , Michael K. Reiter: On Propagating Updates in a Byzantine Environment CoRR cs.DC/9908010 : (1999)

Dahlia Malkhi , Michael K. Reiter, Avishai Wool : The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011 : (1999)

Michael K. Reiter, Aviel D. Rubin : Anonymous Web Transactions with Crowds. Commun. ACM 42 (2): 32-38 (1999)

Vinod Anupam , Alain J. Mayer , Kobbi Nissim , Benny Pinkas , Michael K. Reiter: On the Security of Pay-per-Click and Other Web Advertising Schemes. Computer Networks 31 (11-16): 1091-1100 (1999)

Michael K. Reiter: High-Confidence Distributed Systems - Guest Editor's Introduction. IEEE Internet Computing 3 (6): 52-54 (1999)

Dahlia Malkhi , Michael K. Reiter, Avishai Wool , Rebecca N. Wright : Probabilistic Byzantine Quorum Systems. PODC 1998 : 321

Dahlia Malkhi , Michael K. Reiter: Survivable Consensus Objects. Symposium on Reliable Distributed Systems 1998 : 271-279

Dahlia Malkhi , Michael K. Reiter: Secure and Scalable Replication in Phalanx. Symposium on Reliable Distributed Systems 1998 : 51-58

Michael K. Reiter, Aviel D. Rubin : Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1 (1): 66-92 (1998)

Dahlia Malkhi , Michael K. Reiter: Byzantine Quorum Systems. Distributed Computing 11 (4): 203-213 (1998)

Michael K. Reiter, Stuart G. Stubblebine : Resilient Authentication Using Path Independence. IEEE Trans. Computers 47 (12): 1351-1362 (1998)

Matthew K. Franklin , Michael K. Reiter: Fair Exchange with a Semi-Trusted Third Party (extended abstract). ACM Conference on Computer and Communications Security 1997 : 1-5

Michael K. Reiter, Stuart G. Stubblebine : Path Independence for Authentication in Large-Scale Systems. ACM Conference on Computer and Communications Security 1997 : 57-66

Dahlia Malkhi , Michael K. Reiter: Unreliable Intrusion Detection in Distributed Computations. CSFW 1997 : 116-125

Dahlia Malkhi , Michael K. Reiter, Avishai Wool : The Load and Availability of Byzantine Quorum Systems. PODC 1997 : 249-257

Dahlia Malkhi , Michael K. Reiter, Rebecca N. Wright : Probabilistic Quorum Systems. PODC 1997 : 267-273

Dahlia Malkhi , Michael K. Reiter: Byzantine Quorum Systems. STOC 1997 : 569-578

Dahlia Malkhi , Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. Journal of Computer Security 5 (2): 113-128 (1997)

Michael K. Reiter, Matthew K. Franklin , John B. Lacy , Rebecca N. Wright : The Omega Key Management Service. ACM Conference on Computer and Communications Security 1996 : 38-47

Dalia Malki , Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. CSFW 1996 : 9-17

Don Coppersmith , Matthew K. Franklin , Jacques Patarin , Michael K. Reiter: Low-Exponent RSA with Related Messages. EUROCRYPT 1996 : 1-9

Michael K. Reiter: Distributed Trust with the Rampart Toolkit. Commun. ACM 39 (4): 71-74 (1996)

Michael K. Reiter: A Secure Group Membership Protocol. IEEE Trans. Software Eng. 22 (1): 31-42 (1996)

Matthew K. Franklin , Michael K. Reiter: The Design and Implementation of a Secure Auction Service. IEEE Trans. Software Eng. 22 (5): 302-312 (1996)

Michael K. Reiter, Matthew K. Franklin , John B. Lacy , Rebecca N. Wright : The Omega Key Management Service. Journal of Computer Security 4 (4): 267-288 (1996)

Matthew K. Franklin , Michael K. Reiter: Verifiable Signature Sharing. EUROCRYPT 1995 : 50-63

Michael K. Reiter, Li Gong : Securing Causal Relationships in Distributed Systems. Comput. J. 38 (8): 633-642 (1995)

Michael K. Reiter: Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. ACM Conference on Computer and Communications Security 1994 : 68-80

Michael K. Reiter: The Rampart Toolkit for Building High-Integrity Services. Dagstuhl Seminar on Distributed Systems 1994 : 99-110

Michael K. Reiter, Kenneth P. Birman , Robbert van Renesse : A Security Architecture for Fault-Toerant Systems. ACM Trans. Comput. Syst. 12 (4): 340-371 (1994)

Michael K. Reiter, Kenneth P. Birman : How to Securely Replicate Services. ACM Trans. Program. Lang. Syst. 16 (3): 986-1009 (1994)

Michael K. Reiter: Integrating Security in a Group Oriented Distributed System (Abstract). Operating Systems Review 26 (2): 27 (1992)

1 [ 44 ]

2 [ 41 ] [ 46 ]

3 [ 29 ]

4 [ 43 ]

5 [ 2 ] [ 3 ]

6 [ 44 ]

7 [ 50 ]

8 [ 53 ]

9 [ 74 ]

10 [ 12 ]

11 [ 69 ] [ 76 ]

12 [ 44 ]

13 [ 58 ]

14 [ 7 ] [ 8 ] [ 9 ] [ 12 ] [ 14 ] [ 21 ]

15 [ 72 ]

16 [ 78 ]

17 [ 70 ] [ 80 ]

18 [ 6 ]

19 [ 78 ]

20 [ 50 ]

21 [ 43 ]

22 [ 48 ]

23 [ 43 ] [ 54 ]

24 [ 73 ]

25 [ 79 ]

26 [ 50 ]

27 [ 8 ] [ 14 ]

28 [ 77 ]

29 [ 51 ] [ 59 ]

30 [ 59 ]

31 [ 52 ] [ 55 ] [ 56 ] [ 62 ] [ 63 ] [ 67 ] [ 68 ] [ 71 ]

32 [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 23 ] [ 25 ] [ 26 ] [ 27 ] [ 31 ] [ 32 ] [ 33 ] [ 35 ] [ 36 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 45 ] [ 46 ] [ 47 ] [ 49 ] [ 53 ] [ 61 ] [ 64 ]

33 [ 13 ]

34 [ 32 ] [ 35 ] [ 61 ]

35 [ 29 ]

36 [ 42 ] [ 64 ]

37 [ 37 ] [ 43 ] [ 51 ] [ 57 ] [ 59 ] [ 69 ] [ 76 ]

38 [ 29 ]

39 [ 60 ] [ 73 ]

40 [ 67 ] [ 79 ]

41 [ 12 ]

42 [ 41 ] [ 46 ]

43 [ 29 ]

44 [ 36 ] [ 47 ]

45 [ 3 ]

46 [ 49 ]

47 [ 24 ] [ 30 ]

48 [ 50 ]

49 [ 65 ]

50 [ 48 ]

51 [ 49 ]

52 [ 59 ]

53 [ 70 ] [ 79 ] [ 80 ]

54 [ 20 ] [ 22 ] [ 34 ]

55 [ 42 ] [ 64 ]

56 [ 65 ] [ 77 ]

57 [ 66 ] [ 81 ] [ 82 ] [ 83 ]

58 [ 37 ] [ 51 ] [ 57 ]

59 [ 18 ] [ 27 ] [ 31 ] [ 38 ] [ 45 ]

60 [ 77 ] [ 83 ]

61 [ 8 ] [ 14 ] [ 17 ] [ 27 ] [ 41 ] [ 45 ] [ 50 ]

62 [ 78 ]

63 [ 60 ] [ 73 ]

64 [ 71 ] [ 79 ]

65 [ 73 ]

66 [ 44 ]




©2005 Association for Computing Machinery