Michael Reiter :: Selected Publications by Year
This material is presented to ensure timely dissemination of scholarly
and technical work. Copyright and all rights therein are retained by
authors or by other copyright holders. All persons copying this
information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may not
be reposted without the explicit permission of the copyright holder.
Some citation information for these papers can be found at Google Scholar.
This is not a complete list of my publications. Please see my curriculum vitae for a complete list.
Year:
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
Back to Michael Reiter's
home page
- Minimal TCB code
execution (extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri
In Proceedings of the 2007 IEEE Symposium on Security and
Privacy, pages 267–272, May 2007.
doi:10.1109/SP.2007.27
© IEEE
- Playing devil's advocate: Inferring
sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter
In Proceedings of the 2007 ISOC Network and Distributed System
Security Symposium, pages 35–47, February 2007.
- Consumable credentials in
logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter
In Proceedings of the 2007 ISOC Network and Distributed System
Security Symposium, pages 143–157, February 2007.
- Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang
In Proceedings of the 14th IEEE International Conference on
Network Protocols, pages 43–53, November 2006. doi:10.1109/ICNP.2006.320197
© IEEE
- Packet vaccine: Black-box exploit detection and signature generation
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi
In Proceedings of the 13th ACM Conference on Computer and
Communications Security, pages 37–46, October 2006. doi:10.1145/1180405.1180412
© ACM
- WRAPS: Denial-of-service defense through web referrals
X. Wang and M. K. Reiter
In Proceedings of the 25th IEEE Symposium on Reliable
Distributed Systems, pages 51–60, October 2006. doi:10.1109/SRDS.2006.48
© IEEE
- Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song
In Recent Advances in Intrusion Detection: 9th International
Symposium, RAID 2006 (Lecture Notes in Computer Science 4219),
pages 19–40, September 2006. doi:10.1007/11856214_2
© Springer-Verlag
- Finding peer-to-peer file-sharing
using coarse network behaviors
M. P. Collins and M. K. Reiter
In Computer Security – ESORICS 2006: 11th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 4189), pages 1–17, September 2006. doi:10.1007/11863908_1
©
Springer-Verlag
- A linear logic of authorization
and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter
In Computer Security – ESORICS 2006: 11th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 4189), pages 297–312, September 2006. doi:10.1007/11863908_19
©
Springer-Verlag
- On consistency of encrypted files
A. Oprea and M. K. Reiter
In Distributed Computing: 20th International Symposium, DISC
2006 (Lecture Notes in Computer Science 4167), pages
254–268, September 2006. doi:10.1007/11864219_18
©
Springer-Verlag
- Quorum placement in networks: Minimizing network congestion
D. Golovin, A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter
In Proceedings of the 25th ACM Symposium on Principles of
Distributed Computing, pages 16–25, July 2006. doi:10.1145/1146381.1146388
© ACM
- M2: Multicasting mixes for efficient and anonymous communication
G. Perng, M. K. Reiter and C. Wang
In Proceedings of the 26th IEEE International Conference on
Distributed Computing Systems, July 2006. doi:10.1109/ICDCS.2006.53
© IEEE
- A multi-resolution
approach for worm detection and containment
V. Sekar, Y. Xie, M. K. Reiter and H. Zhang
In Proceedings of the 2006 International Conference on
Dependable Systems and Networks, pages 189–198, June
2006. doi:10.1109/DSN.2006.6
© IEEE
- Bump in the ether:
A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter
In Proceedings of the 2006 USENIX Annual Technical
Conference, pages 185–198, June 2006.
- Distributed
construction of a fault-tolerant network from a tree
M. K. Reiter, A. Samar and C. Wang
In Proceedings of the 24th IEEE Symposium on Reliable
Distributed Systems, pages 155–165, October 2005.
doi:10.1109/RELDIS.2005.16
© IEEE
- Lazy verification in
fault-tolerant distributed storage systems
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and
J. J. Wylie
In Proceedings of the 24th IEEE Symposium on Reliable
Distributed Systems, pages 179–190, October 2005.
doi:10.1109/RELDIS.2005.20
© IEEE
- Fault-scalable Byzantine
fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and
J. J. Wylie
In Proceedings of the 20th ACM Symposium on Operating Systems
Principles, pages 59–74, October 2005.
doi:10.1145/1095810.1095817
© ACM
- Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song
In Recent Advances in Intrusion Detection: 8th International
Symposium, RAID 2005 (Lecture Notes in Computer Science 3858),
pages 63–81, 2005.
doi:10.1007/11663812_4
© Springer-Verlag
- Device-enabled authorization in the
Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar
In Information Security: 8th International Conference, ISC 2005
(Lecture Notes in Computer Science 3650), pages 431–445, 2005.
doi:10.1007/11556992_31
© Springer-Verlag
- Quorum placement in networks to
minimize access delays
A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter
In Proceedings of the 24th ACM Symposium on Principles of
Distributed Computing, pages 87–96, July 2005. doi:10.1145/1073814.1073829
© ACM
- Building reliable
mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright
In Applied Cryptography and Network Security: Third
International Conference, ACNS 2005 (Lecture Notes in Computer
Science 3531), pages 378–392, 2005. doi:10.1007/11496137_26
©
Springer-Verlag
- Worm origin identification using
random moonwalks
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter and H. Zhang
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 242–256, May 2005. doi:10.1109/SP.2005.23
© IEEE
- Seeing-is-believing: Using camera
phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 110–124, May 2005. doi:10.1109/SP.2005.19
© IEEE
- Distributed proving in access-control
systems
L. Bauer, S. Garriss and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 81–95, May 2005. doi:10.1109/SP.2005.9
© IEEE
- Detection of denial-of-message
attacks on sensor network broadcasts
J. M. McCune, E. Shi, A. Perrig and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 64–78, May 2005. doi:10.1109/SP.2005.7
© IEEE
- Space-efficient block storage
integrity
A. Oprea, M. K. Reiter and K. Yang
In Proceedings of the 2005 ISOC Network and Distributed System
Security Symposium, pages 17–28, February 2005.
- Fragile mixing
M. K. Reiter and X. Wang
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 227–235, October 2004.
doi:10.1145/1030083.1030114
© ACM
- Mitigating bandwidth-exhaustion attacks using congestion puzzles
X. Wang and M. K. Reiter
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 257–267, October 2004.
doi:10.1145/1030083.1030118
© ACM
- Gray-box extraction of execution graphs for anomaly detection
D. Gao, M. K. Reiter and D. Song
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 318–329, October 2004.
doi:10.1145/1030083.1030126
© ACM
- Time-scoped searching of encrypted
audit logs
D. Davis, F. Monrose and M. K. Reiter
In Information and Communications Security: 6th International
Conference, ICICS 2004 (Lecture Notes in Computer
Science 3269), pages 532–545, October 2004.
©
Springer-Verlag
- Nested objects in a Byzantine
quorum-replicated system
C. P. Fry and M. K. Reiter
In Proceedings of the 2004 IEEE Symposium on Reliable
Distributed Systems, pages 79–89, October 2004. doi:10.1109/RELDIS.2004.1353005
© IEEE
- Seurat: A pointillist
approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang
In Recent Advances in Intrusion Detection: 7th International
Symposium, RAID 2004
(Lecture Notes in
Computer Science 3224), pages 238–257, September 2004.
©
Springer-Verlag
- Timing attacks in low-latency
mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright
In Financial Cryptography: 8th International Conference, FC
2004 (Lecture Notes in
Computer Science 3110), pages 251–265, September 2004.
©
Springer-Verlag
-
Two-party
generation of DSA signatures
P. MacKenzie and M. K. Reiter
International Journal of Information Security
2(3–4):218–239, August 2004.
doi:10.1007/s10207-004-0041-0
©
Springer-Verlag
-
On gray-box
program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song
In Proceedings of the 13th USENIX Security Symposium,
pages 103–118, August 2004.
-
On user choice in
graphical password schemes
D. Davis, F. Monrose and M. K. Reiter
In Proceedings of the 13th USENIX Security Symposium,
pages 151–164, August 2004.
-
Efficient Byzantine-tolerant
erasure-coded storage
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter
In Proceedings of the 2004 International Conference on
Dependable Systems and Networks, June 2004. doi:10.1109/DSN.2004.1311884 © IEEE
-
Private keyword-based push and pull
with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song, and K. Yang
In Proceedings of the 2nd International Conference on Applied
Cryptography and Network Security (Lecture Notes in Computer
Science 3089), pages 16–30, June 2004.
©
Springer-Verlag
-
An empirical analysis of target-resident
DoS filters
M. Collins and M. K. Reiter
In Proceedings of the 2004 IEEE Symposium on Security and
Privacy, pages 103–114, May 2004. doi:10.1109/SECPRI.2004.1301318
© IEEE
-
Alternatives to non-malleability:
Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang
In Theory of Cryptography: Proceedings of the First Theory of
Cryptography Conference (Lecture Notes in Computer
Science 2951), pages 171–190, February 2004. ©
Springer-Verlag
-
Delegation of cryptographic servers for
capture-resilient devices
P. MacKenzie and M. K. Reiter
Distributed Computing 16(4):307–327, December 2003.
doi:10.1007/s00446-003-0098-4
©
Springer-Verlag
-
Networked
cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter
International Journal of Information Security
2(1):1–20, November 2003. doi:10.1007/s10207-003-0022-8
©
Springer-Verlag
-
Automatic generation of two-party computations
P. MacKenzie, A. Oprea, and M. K. Reiter
In Proceedings of the 10th ACM Conference on Computer and
Communications Security, pages 210–219, October 2003. doi:10.1145/948109.948139
© ACM
-
The design and implementation of a
JCA-compliant capture protection infrastructure
M. K. Reiter, A. Samar, and C. Wang
In Proceedings of the 22nd IEEE Symposium on Reliable
Distributed Systems, October 2003. doi:10.1109/RELDIS.2003.1238086
© IEEE
-
Defending against denial-of-service attacks
with puzzle auctions
X. Wang and M. K. Reiter
In Proceedings of the 2003 IEEE Symposium on Security and
Privacy, pages 78–92, May 2003. doi:10.1109/SECPRI.2003.1199329
© IEEE
-
Objects shared by
Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter, and G. Taubenfeld
Distributed Computing 16(1)37–48, 2003. doi:10.1007/s00446-002-0075-3
©
Springer-Verlag
-
Diffusion without
false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter
Theoretical Computer Science 299(1–3):289–306,
18 April 2003. doi:10.1016/S0304-3975(02)00325-0
-
Advanced concurrency control in Java
P. Felber and M. K. Reiter
Concurrency and Computation: Practice and Experience
14(4):261–285, Wiley, 2002. doi:10.1002/cpe.635
-
Toward speech-generated cryptographic
keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih
In Proceedings of the 11th USENIX Security Symposium, pages
283–296, August 2002.
-
A secure distributed search
system
Y. Xie, D. O'Hallaron and M. K. Reiter
In Proceedings of 11th IEEE International Symposium on High
Performance Distributed Computing, pages 321–330, July 2002.
doi:10.1109/HPDC.2002.1029932
© IEEE
-
Password hardening
based on keystroke dynamics
F. Monrose, M. K. Reiter, and S. G. Wetzel
International Journal on Information Security
1(2):69–83, February 2002. doi:10.1007/s102070100006
©
Springer-Verlag
-
Discouraging software piracy using
software aging
M. Jakobsson and M. K. Reiter
In Security and Privacy in Digital Rights Management
(Lecture Notes in Computer Science 2320), 2002. © Springer-Verlag
-
Delegation of
cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter
In Proceedings of the 8th ACM Conference on Computer and
Communications Security, pages 10–19, November 2001. doi:10.1145/501983.501986
© ACM
Note: This paper is superceded by the journal
version.
-
An authorization model for a public
key management service
P. Samarati, M. K. Reiter and S. Jajodia
ACM Transactions on Information and System Security
4(4):453–482, November 2001. doi:10.1145/503339.503343
© ACM
-
Probabilistic quorum
systems
D. Malkhi, M. K. Reiter, A. Wool, and R. N. Wright
Information and Computation 170(2): 184–206, 1
November 2001. doi:10.1006/inco.2001.3054
-
Efficient update diffusion in Byzantine
environments
D. Malkhi, M. K. Reiter, O. Rodeh and Y. Sella
In Proceedings of 20th IEEE Symposium on Reliable Distributed
Systems, pages 90–98, October 2001. doi:10.1109/RELDIS.2001.969758
© IEEE
-
Fault detection for
Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, and M. K. Reiter
IEEE Transactions on Parallel and Distributed Systems
12(9):996–1007, September 2001. doi:10.1109/71.954640
© IEEE
-
Selective private function evaluation
with applications to private statistics
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and
R. N. Wright
In Proceedings of the 20th ACM Symposium on Principles of
Distributed Computing, August 2001. doi:10.1145/383962.384047
© ACM
-
Two party generation of DSA
signatures
P. MacKenzie and M. K. Reiter
In Advances in Cryptology—CRYPTO 2001 (Lecture Notes
in Computer Science 2139), August 2001. © Springer-Verlag
Note: This paper is superceded by the
journal version.
-
Persistent objects in the Fleet
system
D. Malkhi, M. K. Reiter, D. Tulone, and E. Ziskind
In Proceedings of the 2nd DARPA Information Survivability
Conference and Exposition (DISCEX II), Vol. II, pages
126–136, June 2001. doi:10.1109/DISCEX.2001.932165
© IEEE
-
Using voice to generate cryptographic
keys
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel
In Proceedings of 2001: A Speaker Odyssey, The Speaker
Recognition Workshop, pages 237–242, June 2001.
-
Networked cryptographic
devices resilient to capture
P. MacKenzie and M. K. Reiter
In Proceedings of the 2001 IEEE Symposium on Security and
Privacy, pages 12–25, May 2001. doi:10.1109/SECPRI.2001.924284
© IEEE
Note: This paper is superceded by the
journal version.
-
Cryptographic key generation from
voice
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel
In Proceedings of the 2001 IEEE Symposium on Security and
Privacy, pages 202–213, May 2001. doi:10.1109/SECPRI.2001.924299
© IEEE
-
Backoff protocols for distributed mutual
exclusion and ordering
G. Chockler, D. Malkhi, and M. K. Reiter
In Proceedings of the 21st International Conference on
Distributed Computing Systems, pages 11–20, April
2001. doi:10.1109/ICDSC.2001.918928
© IEEE
-
On k-set
consensus problems in asynchronous systems
R. De Prisco, D. Malkhi, and M. K. Reiter
IEEE Transactions on Parallel and Distributed Systems
12(1):7–21, January 2001. doi:10.1109/71.899936
© IEEE
-
Secure
execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter
IEEE Transactions on Software Engineering
26(12):1197–1209, December 2000. doi:10.1109/32.888632
© IEEE
-
The load and
availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter, and A. Wool
SIAM Journal of Computing 29(6):1889–1906, 2000.
doi:10.1137/S0097539797325235
-
Objects shared by Byzantine
processes
D. Malkhi, M. Merritt, M. K. Reiter, and G. Taubenfeld
In Proceedings of the 14th International Symposium on
Distributed Computing (Lecture Notes in Computer Science 1914),
pages 345–359, Springer, October 2000. © Springer-Verlag
Note: This paper is superceded by the journal
version.
-
Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose, and M. K. Reiter
In Proceedings of the 2000 ACM Conference on Electronic
Commerce, pages 176–184, October 2000. doi:10.1145/352871.352891
© ACM
-
Dynamic Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, M. K. Reiter, and R. N. Wright
In Proceedings of the International Conference on Dependable
Systems and Networks, pages 283–292, June 2000. doi:10.1109/ICDSN.2000.857551
© IEEE
-
An architecture for
survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter
IEEE Transactions on Knowledge and Data Engineering
12(2):187–202, March/April 2000. doi:10.1109/69.842262
© IEEE
-
Password hardening based on
keystroke dynamics
F. Monrose, M. K. Reiter, and S. Wetzel
In Proceedings of the 6th ACM Conference on Computer and
Communications Security, pages 73–82, November 1999. doi:10.1145/319709.319720
© ACM
Note: This paper is superceded by the journal
version.
-
On diffusing updates in a Byzantine
environment
D. Malkhi, Y. Mansour, and M. K. Reiter
In Proceedings of the 18th IEEE Symposium on Reliable
Distributed Systems, pages 134–143, October 1999. doi:10.1109/RELDIS.1999.805090
© IEEE
Note: This paper is superceded by the journal
version.
-
The design and analysis of graphical
passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin, and M. K. Reiter
In Proceedings of the 8th USENIX Security Symposium, pages
1–14, August 1999.
-
Authentication
metric analysis and design
M. K. Reiter and S. G. Stubblebine
ACM Transactions on Information and System Security
2(2):138–158, May 1999. doi:10.1145/317087.317088
© ACM
-
On the security of pay-per-click and
other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas, and M. K. Reiter
Computer Networks 31(11–16):1091–1100, 17 May
1999. doi:10.1016/S1389-1286(99)00023-7
-
On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi, and M. K. Reiter
In Proceedings of the 18th ACM Symposium on Principles of
Distributed Computing, pages 257–265, May 1999. doi:10.1145/301308.301368 © ACM
Note: This paper is superceded by the
journal version.
-
Fault detection for Byzantine quorum
systems
L. Alvisi, D. Malkhi, L. Pierce, and M. K. Reiter
In Proceedings of the 7th IFIP Working Conference on Dependable
Computing for Critical Applications, pages 357–371, January
1999. doi:10.1109/DCFTS.1999.814307
© IEEE
Note: This paper is superceded by the journal
version.
-
Resilient authentication using path
independence
M. K. Reiter and S. G. Stubblebine
IEEE Transactions on Computers 47(12):1351–1362,
December 1998. doi:10.1109/12.737682
© IEEE
-
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security
1(1):66–92, November 1998. doi:10.1145/290163.290168
© ACM
-
Byzantine quorum
systems
D. Malkhi and M. Reiter
Distributed Computing 11(4):203–213, October 1998.
doi:10.1007/s004460050050
©
Springer-Verlag
-
Survivable consensus objects
D. Malkhi and M. Reiter
In Proceedings of the 17th IEEE Symposium on Reliable
Distributed Systems, pages 271–279, October 1998. doi:10.1109/RELDIS.1998.740509
© IEEE
Note: This paper is superceded by the journal
version.
-
Secure and scalable replication in
Phalanx
D. Malkhi and M. Reiter
In Proceedings of the 17th IEEE Symposium on Reliable
Distributed Systems, pages 51–58, October 1998. doi:10.1109/RELDIS.1998.740474
© IEEE
-
Detecting hit shaving in click-through
payment schemes
M. K. Reiter, V. Anupam, and A. Mayer
In Proceedings of the 3rd USENIX Workshop on Electronic
Commerce, pages 155–166, August 1998.
-
Secure execution of Java applets using a
remote playground
D. Malkhi, M. Reiter, and A. Rubin
In Proceedings of the 1998 IEEE Symposium on Security and
Privacy, pages 40–51, May 1998. doi:10.1109/SECPRI.1998.674822
© IEEE
Note: This paper is superceded by the journal
version.
-
The load and availability
of Byzantine quorum systems
D. Malkhi, M. Reiter, and A. Wool
In Proceedings of the 16th ACM Symposium on Principles of
Distributed Computing, pages 249–257, August 1997. doi:10.1145/259380.259450
© ACM
Note: This paper is superceded by the journal
version.
-
Probabilistic quorum systems
D. Malkhi, M. Reiter, and R. Wright
In Proceedings of the 16th ACM Symposium on Principles of
Distributed Computing, pages 267–273, August 1997. doi:10.1145/259380.259458
© ACM
Note: This paper is superceded by the journal
version.
-
Unreliable intrusion detection in
distributed computations
D. Malkhi and M. Reiter
In Proceedings of the 10th IEEE Computer Security Foundations
Workshop, pages 116–124, June 1997. doi:10.1109/CSFW.1997.596799
© IEEE
-
Byzantine quorum systems
D. Malkhi and M. Reiter
In Proceedings of the 29th ACM Symposium on Theory of
Computing, pages 569–578, May 1997. doi:10.1145/258533.258650
© ACM
Note: This paper is superceded by the journal
version.
-
Toward acceptable metrics of
authentication
M. K. Reiter and S. G. Stubblebine
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, pages 10–20, May 1997. doi:10.1109/SECPRI.1997.601308
© IEEE
Note: This paper is superceded by the
journal version.
-
Fair exchange with a semi-trusted third party
M. K. Franklin and M. K. Reiter
In Proceedings of the 4th ACM Conference on Computer and
Communications Security, pages 1–6, April 1997. doi:10.1145/266420.266424
© ACM
-
Path independence for authentication in large-scale systems
M. K. Reiter and S. G. Stubblebine
In Proceedings of the 4th ACM Conference on Computer and
Communications Security, pages 57–66, April 1997. doi:10.1145/266420.266435
© ACM
Note: This paper is superceded by the journal
version.
-
A high-throughput secure reliable multicast
protocol
D. Malkhi and M. Reiter
Journal of Computer Security 5:113–127, IOS Press,
1997.
-
The
Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy, and R. N. Wright
Journal of Computer Security 4(4):267–287, IOS Press,
1996.
-
A high-throughput secure reliable
multicast protocol
D. Malki and M. Reiter
In Proceedings of the 9th IEEE Computer Security Foundations
Workshop, pages 9–17, June 1996. doi:10.1109/CSFW.1996.503686
© IEEE
Note: This paper is superceded by the journal
version.
-
The design and
implementation of a secure auction service
M. K. Franklin and M. K. Reiter
IEEE Transactions on Software Engineering
22(5):302–312, May 1996. doi:10.1109/32.502223
© IEEE
-
Low-exponent RSA with related
messages
D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter
In Advances in Cryptology—EUROCRYPT '96 (Lecture
Notes in Computer Science 1070), pages 1–9, 1996. ©
Springer-Verlag
-
The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy, and R. N. Wright
In Proceedings of the 3rd ACM Conference on Computer and
Communications Security, pages 38–47, March 1996. doi:10.1145/238168.238184
Note: This paper is superceded by the journal
version.
-
A secure group
membership protocol
M. K. Reiter
IEEE Transactions on Software Engineering
22(1):31–42, January 1996. doi:10.1109/32.481515
© IEEE
-
Securing
causal relationships in distributed systems
M. K. Reiter and L. Gong
The Computer Journal 38(8):633–642, 1995.
doi:10.1093/comjnl/38.8.633
© British Computer Society
-
The Rampart toolkit for building
high-integrity services
M. K. Reiter
In Theory and Practice in Distributed Systems (Lecture
Notes in Computer Science 938), pages 99–110, 1995. ©
Springer-Verlag
-
The design and implementation of a secure
auction service
M. K. Franklin and M. K. Reiter
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 2–14, May 1995. doi:10.1109/SECPRI.1995.398918
© IEEE
Note: This paper is superceded by the
journal version.
-
Verifiable signature sharing
M. K. Franklin and M. K. Reiter
In Advances in Cryptology—EUROCRYPT '95 (Lecture
Notes in Computer Science 921), pages 50–63, 1995. ©
Springer-Verlag
-
A security architecture
for fault-tolerant systems
M. K. Reiter, K. P. Birman, and R. van Renesse
ACM Transactions on Computer Systems 12(4):340–371,
November 1994. doi:10.1145/195792.195823
© ACM
-
Secure agreement protocols: Reliable and
atomic group multicast in Rampart
M. K. Reiter
In Proceedings of the 2nd ACM Conference on Computer and
Communication Security, pages 68–80, November 1994. doi:10.1145/191177.191194
© ACM
-
How to securely replicate services
M. K. Reiter and K. P. Birman
ACM Transactions on Programming Languages and Systems
16(3):986–1009, May 1994. doi:10.1145/177492.177745
© ACM
-
A secure group membership protocol
M. K. Reiter
In Proceedings of the 1994 IEEE Symposium on Research in
Security and Privacy, pages 176–189, May 1994. doi:10.1109/RISP.1994.296582
© IEEE
Note: This paper is superceded by the
journal version.
-
Preventing denial and forgery
of causal relationships in distributed systems
M. K. Reiter and L. Gong
In Proceedings of the 1993 IEEE Symposium on Research in
Security and Privacy, pages 30–40, May 1993. doi:10.1109/RISP.1993.287645
© IEEE
Note: This paper is superceded by the journal
version.
-
Integrating security in a
group oriented distributed system
M. K. Reiter, K. P. Birman, and L. Gong
In Proceedings of the 1992 IEEE Symposium on Research in
Security and Privacy, pages 18–32, May 1992. doi:10.1109/RISP.1992.213273
© IEEE
Back to top
Back to Michael Reiter's
home page