共 50 条
- [21] Threshold fail-stop signature schemes based on discrete logarithm and factorization INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 292 - 307
- [22] Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature SYMMETRY-BASEL, 2017, 9 (03):
- [23] That's Not My Signature! Fail-Stop Signatures for a Post-quantum World ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 107 - 140
- [24] Assured reconfiguration of fail-stop systems 2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 2 - 11
- [26] Checkpointing Workflows for Fail-Stop Errors 2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 487 - 497
- [27] How fail-stop are faulty programs? TWENTY-EIGHTH ANNUAL INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT COMPUTING, DIGEST PAPERS, 1998, : 240 - 249
- [28] On the security for the fail-stop digital signatures WAVELET ANALYSIS AND ITS APPLICATIONS (WAA), VOLS 1 AND 2, 2003, : 814 - 820
- [29] Fail-stop components by pattern matching FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS IV, 2000, 49 : 351 - 370
- [30] Extremely Simple Fail-Stop ECDSA Signatures APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 230 - 234