Distributed Security
Recently Added Items
| Title | Added By | Updated On |
|---|---|---|
| The Sybil Attack | relet | Dec 15, 2011 12:09:56 AM |
| Can We Trust Trust? | relet | Dec 15, 2011 12:09:53 AM |
| Do-All Computing in Distributed Systems | relet | Dec 15, 2011 12:09:54 AM |
| Some Protocols Useful on the Internet from Threshold Signature Schemes | relet | Dec 15, 2011 12:09:55 AM |
| Some Digital Signature Schemes with Collective Signers | relet | Dec 15, 2011 12:09:57 AM |
| Cryptographic techniques for mobile ad-hoc networks | relet | Dec 15, 2011 12:09:52 AM |
| Nick Szabo's Home Page | relet | Jun 2, 2009 8:27:49 AM |
See all 7 items for this group in the Group Library.
Among knowledgeable
distributed security designers
unconditionally trusted third
parties are now viewed as a
cheat ~ here we pray for
heavenly benevolence
nick zsabo
- Owner: Thomas Hirsch
- Registered: 2009-06-02
- Type: Public
- Membership: Open

Upgrade Storage