Michael K. Reiter Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
152Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYao Liu, Michael K. Reiter, Peng Ning: False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security 2009: 21-32
151Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael K. Reiter, Zheng Dong: Privacy-preserving genomic computation through program specialization. ACM Conference on Computer and Communications Security 2009: 338-347
150Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908
149Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTing-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter: Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. DIMVA 2009: 157-175
148Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDarrell Bethea, Michael K. Reiter: Data Structures with Unpredictable Timing. ESORICS 2009: 456-471
147Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang: Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. ICISS 2009: 132-147
146Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Safe Passage for Passwords and Other Sensitive Data. NDSS 2009
145Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Li, Debin Gao, Michael K. Reiter: Automatically Adapting a Trained Anomaly Detector to Software Patches. RAID 2009: 142-160
144Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Limin Jia, Michael K. Reiter, David Swasey: xDomain: cross-border proofs of access. SACMAT 2009: 43-52
143Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Sec. Comput. 6(2): 96-110 (2009)
142Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: using camera phones for human-verifiable authentication. IJSN 4(1/2): 43-56 (2009)
2008
141Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter: Towards practical biometric key generation with randomized biometric templates. ACM Conference on Computer and Communications Security 2008: 235-244
140Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25
139Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRobert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482
138Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552
137Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTing-Fang Yen, Michael K. Reiter: Traffic Aggregation for Malware Detection. DIMVA 2008: 207-227
136Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter: AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246
135Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki: Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328
134Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255
133Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Asad Samar, Chenxi Wang: Self-optimizing distributed trees. IPDPS 2008: 1-12
132Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLScott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter: Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008
131Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen: cSamp: A System for Network-Wide Flow Monitoring. NSDI 2008: 233-246
130Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael G. Merideth, Michael K. Reiter: Write Markers for Probabilistic Quorum Systems. OPODIS 2008: 5-21
129Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLM. Patrick Collins, Michael K. Reiter: On the Limits of Payload-Oblivious Network Attack Detection. RAID 2008: 251-270
128Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Scott Garriss, Michael K. Reiter: Detecting and resolving policy misconfigurations in access-control systems. SACMAT 2008: 185-194
127Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLucas Ballard, Seny Kamara, Michael K. Reiter: The Practical Subtleties of Biometric Key Generation. USENIX Security Symposium 2008: 61-74
126Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
125Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Asad Samar: Quiver: Consistent and Scalable Object Sharing for Edge Services. IEEE Trans. Parallel Distrib. Syst. 19(7): 878-889 (2008)
124Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Michael K. Reiter: A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008)
2007
123Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael G. Merideth, Michael K. Reiter: Probabilistic Opaque Quorum Systems. DISC 2007: 403-419
122Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFlorian Oprea, Michael K. Reiter: Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. DSN 2007: 409-418
121Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: Trustworthy Services and the Biological Analogy. ESORICS 2007: 1
120Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Scott Garriss, Michael K. Reiter: Efficient Proving for Practical Distributed Access-Control Systems. ESORICS 2007: 19-37
119Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: Minimal TCB Code Execution. IEEE Symposium on Security and Privacy 2007: 267-272
118Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter: Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007
117Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLScott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007
116Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJames Hendricks, Gregory R. Ganger, Michael K. Reiter: Verifying distributed erasure-coded data. PODC 2007: 139-146
115Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLM. Patrick Collins, Michael K. Reiter: Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. RAID 2007: 276-295
114Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJames Hendricks, Gregory R. Ganger, Michael K. Reiter: Low-overhead byzantine fault-tolerant storage. SOSP 2007: 73-86
113Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75
2006
112Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46
111Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYinglian Xie, Michael K. Reiter, David R. O'Hallaron: Protecting Privacy in Key-Value Search Systems. ACSAC 2006: 493-504
110Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlina Oprea, Michael K. Reiter: On Consistency of Encrypted Files. DISC 2006: 254-268
109Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang: A Multi-Resolution Approach forWorm Detection and Containment. DSN 2006: 189-198
108Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael P. Collins, Michael K. Reiter: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. ESORICS 2006: 1-17
107Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDeepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter: A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312
106Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie: Towards bounded wait-free PASIS. From Security to Dependability 2006
105Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGinger Perng, Michael K. Reiter, Chenxi Wang: M2: Multicasting Mixes for Efficient and Anonymous Communication. ICDCS 2006: 59
104Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Zhang: Forensic Analysis for Epidemic Attacks in Federated Networks. ICNP 2006: 43-53
103Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Golovin, Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter: Quorum placement in networks: minimizing network congestion. PODC 2006: 16-25
102Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40
101Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Michael K. Reiter: WRAPS: Denial-of-Service Defense through Web Referrals. SRDS 2006: 51-60
100Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX Annual Technical Conference, General Track 2006: 185-198
2005
99no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJohn Riedl, Michael J. Kearns, Michael K. Reiter: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005 ACM 2005
98Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, XiaoFeng Wang, Matthew Wright: Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392
97Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. IEEE Symposium on Security and Privacy 2005: 110-124
96Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang: Worm Origin Identification Using Random Moonwalks. IEEE Symposium on Security and Privacy 2005: 242-256
95Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78
94Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Scott Garriss, Michael K. Reiter: Distributed Proving in Access-Control Systems. IEEE Symposium on Security and Privacy 2005: 81-95
93Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar: Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445
92Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGinger Perng, Michael K. Reiter, Chenxi Wang: Censorship Resistance Revisited. Information Hiding 2005: 62-76
91Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlina Oprea, Michael K. Reiter: Space-Efficient Block Storage Integrity. NDSS 2005
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter: Quorum placement in networks to minimize access delays. PODC 2005: 87-96
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Behavioral Distance for Intrusion Detection. RAID 2005: 63-81
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie: Fault-scalable Byzantine fault-tolerant services. SOSP 2005: 59-74
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Asad Samar, Chenxi Wang: Distributed Construction of a Fault-Tolerant Network from a Tree. SRDS 2005: 155-165
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Abd-El-Malek, Gregory R. Ganger, Michael K. Reiter, Jay J. Wylie, Garth R. Goodson: Lazy Verification in Fault-Tolerant Distributed Storage Systems. SRDS 2005: 179-190
2004
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, XiaoFeng Wang: Fragile mixing. ACM Conference on Computer and Communications Security 2004: 227-235
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Michael K. Reiter: Mitigating bandwidth-exhaustion attacks using congestion puzzles. ACM Conference on Computer and Communications Security 2004: 257-267
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: Gray-box extraction of execution graphs for anomaly detection. ACM Conference on Computer and Communications Security 2004: 318-329
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang: Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGarth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter: Efficient Byzantine-Tolerant Erasure-Coded Storage. DSN 2004: 135-144
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBrian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright: Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDarren Davis, Fabian Monrose, Michael K. Reiter: Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: Security by, and for, Converged Mobile Devices. ICISC 2004: 1
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael P. Collins, Michael K. Reiter: An Empirical Analysis of Target-Resident DoS Filters. IEEE Symposium on Security and Privacy 2004: 103-114
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang: Seurat: A Pointillist Approach to Anomaly Detection. RAID 2004: 238-257
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCharles P. Fry, Michael K. Reiter: Nested Objects in a Byzantine Quorum-Replicated System. SRDS 2004: 79-89
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter, Ke Yang: Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). TCC 2004: 171-190
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebin Gao, Michael K. Reiter, Dawn Xiaodong Song: On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDarren Davis, Fabian Monrose, Michael K. Reiter: On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Pankaj Rohatgi: Homeland Security. IEEE Internet Computing 8(6): 16-17 (2004)
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Two-party generation of DSA signatures. Int. J. Inf. Sec. 2(3-4): 218-239 (2004)
2003
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Alina Oprea, Michael K. Reiter: Automatic generation of two-party computations. ACM Conference on Computer and Communications Security 2003: 210-219
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Michael K. Reiter: Defending Against Denial-of-Service Attacks with Puzzle Auction. IEEE Symposium on Security and Privacy 2003: 78-92
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Asad Samar, Chenxi Wang: The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003: 339-348
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects shared by Byzantine processes. Distributed Computing 16(1): 37-48 (2003)
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. Distributed Computing 16(4): 307-327 (2003)
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Networked cryptographic devices resilient to capture. Int. J. Inf. Sec. 2(1): 1-20 (2003)
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Yishay Mansour, Michael K. Reiter: Diffusion without false rumors: on propagating updates in a Byzantine environment. Theor. Comput. Sci. 1-3(299): 289-306 (2003)
2002
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYinglian Xie, David R. O'Hallaron, Michael K. Reiter: A Secure Distributed Search System. HPDC 2002: 321-
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih: Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296
60no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Felber, Michael K. Reiter: Advanced concurrency control in Java. Concurrency and Computation: Practice and Experience 14(4): 261-285 (2002)
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002)
2001
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Delegation of cryptographic servers for capture-resilient devices. ACM Conference on Computer and Communications Security 2001: 10-19
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Two-Party Generation of DSA Signatures. CRYPTO 2001: 137-154
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarkus Jakobsson, Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGregory Chockler, Dahlia Malkhi, Michael K. Reiter: Backoff Protocols for Distributed Mutual Exclusion and Ordering. ICDCS 2001: 11-20
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilip D. MacKenzie, Michael K. Reiter: Networked Cryptographic Devices Resilient to Capture. IEEE Symposium on Security and Privacy 2001: 12-25
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel: Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001: 202-213
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRan Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella: Efficient Update Diffusion in Byzantine Environments. SRDS 2001: 90-98
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPierangela Samarati, Michael K. Reiter, Sushil Jajodia: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001)
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto De Prisco, Dahlia Malkhi, Michael K. Reiter: On k-Set Consensus Problems in Asynchronous Systems. IEEE Trans. Parallel Distrib. Syst. 12(1): 7-21 (2001)
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter: Fault Detection for Byzantine Quorum Systems. IEEE Trans. Parallel Distrib. Syst. 12(9): 996-1007 (2001)
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001)
2000
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCarlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRobert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects Shared by Byzantine Processes. DISC 2000: 345-359
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Dynamic Byzantine Quorum Systems. DSN 2000: 283-
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: An Architecture for Survivable Coordination in Large Distributed Systems. IEEE Trans. Knowl. Data Eng. 12(2): 187-202 (2000)
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Secure Execution of Java Applets Using a Remote Playground. IEEE Trans. Software Eng. 26(12): 1197-1209 (2000)
40no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000)
1999
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999: 73-82
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto De Prisco, Dahlia Malkhi, Michael K. Reiter: On k-Set Consensus Problems in Asynchronous Systems. PODC 1999: 257-265
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Yishay Mansour, Michael K. Reiter: On Diffusing Updates in a Byzantine Environment. SRDS 1999: 134-143
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Stuart G. Stubblebine: Authentication Metric Analysis and Design. ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999)
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Secure Execution of Java Applets using a Remote Playground CoRR cs.CR/9908009: (1999)
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Yishay Mansour, Michael K. Reiter: On Propagating Updates in a Byzantine Environment CoRR cs.DC/9908010: (1999)
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011: (1999)
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999)
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter: On the Security of Pay-per-Click and Other Web Advertising Schemes. Computer Networks 31(11-16): 1091-1100 (1999)
30no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: High-Confidence Distributed Systems - Guest Editor's Introduction. IEEE Internet Computing 3(6): 52-54 (1999)
1998
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Aviel D. Rubin: Secure Execution of Java Applets using a Remote Playground. IEEE Symposium on Security and Privacy 1998: 40-51
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321
27no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Survivable Consensus Objects. SRDS 1998: 271-279
26no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Secure and Scalable Replication in Phalanx. SRDS 1998: 51-58
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Aviel D. Rubin: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998)
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Byzantine Quorum Systems. Distributed Computing 11(4): 203-213 (1998)
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Stuart G. Stubblebine: Resilient Authentication Using Path Independence. IEEE Trans. Computers 47(12): 1351-1362 (1998)
1997
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthew K. Franklin, Michael K. Reiter: Fair Exchange with a Semi-Trusted Third Party (extended abstract). ACM Conference on Computer and Communications Security 1997: 1-5
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Stuart G. Stubblebine: Path Independence for Authentication in Large-Scale Systems. ACM Conference on Computer and Communications Security 1997: 57-66
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Unreliable Intrusion Detection in Distributed Computations. CSFW 1997: 116-125
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Stuart G. Stubblebine: Toward Acceptable Metrics of Authentication. IEEE Symposium on Security and Privacy 1997: 10-20
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Probabilistic Quorum Systems. PODC 1997: 267-273
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: Byzantine Quorum Systems. STOC 1997: 569-578
15no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDahlia Malkhi, Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. Journal of Computer Security 5(2): 113-128 (1997)
1996
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. ACM Conference on Computer and Communications Security 1996: 38-47
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDalia Malki, Michael K. Reiter: A High-Throughput Secure Reliable Multicast Protocol. CSFW 1996: 9-17
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDon Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter: Low-Exponent RSA with Related Messages. EUROCRYPT 1996: 1-9
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: Distributed Trust with the Rampart Toolkit. Commun. ACM 39(4): 71-74 (1996)
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: A Secure Group Membership Protocol. IEEE Trans. Software Eng. 22(1): 31-42 (1996)
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthew K. Franklin, Michael K. Reiter: The Design and Implementation of a Secure Auction Service. IEEE Trans. Software Eng. 22(5): 302-312 (1996)
8no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. Journal of Computer Security 4(4): 267-288 (1996)
1995
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthew K. Franklin, Michael K. Reiter: Verifiable Signature Sharing. EUROCRYPT 1995: 50-63
6no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Li Gong: Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995)
1994
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. ACM Conference on Computer and Communications Security 1994: 68-80
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: The Rampart Toolkit for Building High-Integrity Services. Dagstuhl Seminar on Distributed Systems 1994: 99-110
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Kenneth P. Birman, Robbert van Renesse: A Security Architecture for Fault-Toerant Systems. ACM Trans. Comput. Syst. 12(4): 340-371 (1994)
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter, Kenneth P. Birman: How to Securely Replicate Services. ACM Trans. Program. Lang. Syst. 16(3): 986-1009 (1994)
1992
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael K. Reiter: Integrating Security in a Group Oriented Distributed System (Abstract). Operating Systems Review 26(2): 27 (1992)

Coauthor Index

1Michael Abd-El-Malek [86] [88] [106]
2Carlisle M. Adams (Carlisle Adams) [46]
3Lorenzo Alvisi [43] [48]
4David G. Andersen [131]
5Vinod Anupam [31]
6Robert M. Arlein [45]
7Kelli Bacon [139]
8Lucas Ballard [127] [141]
9Lujo Bauer [93] [94] [107] [113] [118] [120] [128] [138] [139] [144] [150]
10Darrell Bethea [148]
11Kenneth P. Birman (Ken Birman) [2] [3]
12Kevin D. Bowers [107] [118]
13Mike Burmester [46]
14Ran Canetti [52]
15Gregory Chockler [55]
16Jong Youl Choi [112] [126]
17M. Patrick Collins [115] [129]
18Michael P. Collins [77] [108] [117]
19Don Coppersmith [12]
20Scott E. Coull [117] [132]
21Lorrie Faith Cranor [113] [138] [139] [150]
22Darren Davis [72] [79]
23Yvo Desmedt [46]
24Zheng Dong [151]
25Pascal Felber [60]
26Matthew K. Franklin [7] [8] [9] [12] [14] [22]
27Charles P. Fry [75]
28Gregory R. Ganger [81] [86] [88] [106] [114] [116]
29Debin Gao [73] [83] [89] [102] [134] [143] [145]
30Deepak Garg [107] [118]
31Scott Garriss [93] [94] [120] [128]
32Daniel Golovin [103]
33Li Gong [6]
34Garth R. Goodson [81] [86] [88] [106]
35Anupam Gupta [90] [103]
36James Hendricks [114] [116]
37Keisha How [139]
38Xin Huang [149]
39Yuval Ishai [52]
40Hiroshi Isozaki [135]
41Ben Jai [45]
42Sushil Jajodia [50]
43Markus Jakobsson [45] [56]
44Limin Jia [144]
45Seny Kamara [127] [141]
46Michael J. Kearns [99]
47Angelos D. Keromytis [132]
48Chongkyung Kil [112] [126]
49Hyang-Ah Kim [76]
50Lea Kissner [82]
51Ramana Rao Kompella [131]
52Ravi Kumar (S. Ravi Kumar) [52]
53John B. Lacy [8] [14]
54Brian Neil Levine [80]
55Peng Li [145]
56Qi Li [53] [61]
57Zhou Li [151]
58Zhuowei Li [112] [126] [136]
59Zhenkai Liang [136]
60Yao Liu [152]
61Daniel P. Lopresti [61]
62Philip D. MacKenzie [54] [57] [58] [64] [65] [69] [70] [74]
63Bruce M. Maggs [90] [103]
64Dahlia Malkhi (Dalia Malki) [13] [15] [16] [17] [18] [20] [24] [26] [27] [28] [29] [33] [34] [35] [37] [38] [40] [41] [42] [43] [44] [47] [48] [49] [51] [55] [63] [66]
65David A. Maltz [96]
66Yishay Mansour [34] [37] [63]
67Alain J. Mayer [31]
68Jonathan M. McCune [93] [95] [97] [100] [119] [135] [140] [142] [146]
69Michael G. Merideth [123] [130]
70Michael Merritt [44] [66]
71Fabian Monrose [39] [45] [53] [59] [61] [72] [79] [117] [132] [141] [149]
72Peng Ning [152]
73Kobbi Nissim [31]
74David R. O'Hallaron [62] [76] [111]
75Alina Oprea [69] [82] [91] [110]
76Florian Oprea [90] [103] [122]
77Bryan Parno [119] [135] [140]
78Jacques Patarin [12]
79Ginger Perng [92] [105]
80Adrian Perrig [95] [97] [100] [119] [135] [140] [142] [146]
81Frank Pfenning [107] [118]
82Evelyn Tumlin Pierce [43] [48]
83Benny Pinkas [31]
84Roberto De Prisco [38] [49]
85Robert W. Reeder [138] [139] [150]
86Robbert van Renesse [3]
87John Riedl [99]
88Ohad Rodeh [51]
89Pankaj Rohatgi [71]
90Jason Rouse [93]
91Aviel D. Rubin [25] [29] [32]
92Ronitt Rubinfeld [52]
93Peter Rutenbar [93]
94Asad Samar [67] [87] [125] [133]
95Pierangela Samarati [50]
96Vyas Sekar [96] [104] [109] [131] [147]
97Yaron Sella [51]
98Arvind Seshadri [119] [140]
99Elaine Shi [95]
100Chilin Shih [61]
101Dawn Xiaodong Song (Dawn Song) [73] [82] [83] [89] [102] [134] [143]
102Chad Spensky [147]
103Heather Strong [139]
104Stuart G. Stubblebine [19] [21] [23] [36]
105David Swasey [144]
106Haixu Tang [151]
107Gadi Taubenfeld [44] [66]
108Kami Vaniea [113] [138] [150]
109Chenxi Wang [67] [80] [87] [92] [105] [133]
110Rui Wang [151]
111XiaoFeng Wang [68] [84] [85] [98] [101] [112] [124] [126] [136] [151]
112Susanne Wetzel [39] [53] [59]
113Walter Willinger [131]
114Avishai Wool [18] [28] [33] [40] [47]
115Charles V. Wright [117] [132]
116Matthew Wright [80] [98]
117Rebecca N. Wright [8] [14] [17] [28] [43] [47] [52]
118Jay J. Wylie [81] [86] [88] [106]
119Yinglian Xie [62] [76] [96] [104] [109] [111]
120Jun Xu [112] [126]
121Ke Yang [74] [82]
122Ting-Fang Yen [137] [149]
123Hui Zhang [76] [96] [104] [109] [131]
124Zhenghao Zhang [147]
125Philip Zimmermann [46]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)