{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T23:51:37Z","timestamp":1776210697158,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_38","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"425-438","source":"Crossref","is-referenced-by-count":43,"title":["Maintaining Security in the Presence of Transient Faults"],"prefix":"10.1007","author":[{"given":"Ran","family":"Canetti","sequence":"first","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"[BGH+93a]_Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. A family of light-weight protocols for authentication and key distribution. Submitted to IEEE T. Networking, 1993."},{"issue":"5","key":"38_CR2","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"B. Bird","year":"1993","unstructured":"[BGH+93b]_Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679\u2013693, June 1993. Special issue on Secure Communications. See also a different version in Crypto 91.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and password file compromise. In 1st ACM Conference on Computer and Communications Security, pages 244\u2013250, November 1993.","DOI":"10.1145\/168588.168618"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phil Rogaway. Entity authentication and key distribution. In Advances in Cryptology: Proc. of Crypto 93, pages 232\u2013249, August 1993.","DOI":"10.1007\/3-540-48329-2_21"},{"key":"38_CR5","unstructured":"Chee-Seng Chow and Amir Herzberg. A reconstructible proactive pseudorandomness protocol. Work in progress, June 1994."},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"M. Elchin and J. Rochlis. With microscope and tweezers: An analysis of the internet virus of november 1988. In IEEE Symp. on Security and Privacy, pages 326\u2013343, 1989.","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"P. Feldman and S. Micali. Optimal algorithms for byzantine agreement. In Proceedings of the 20 th Annual ACM Symposium on Theory of Computing, pages 148\u2013161, May 1988.","DOI":"10.1145\/62212.62225"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Mat Franklin and Moti Yung. Eavesdropping games: A graph-theoretic approach to privacy in distributed systems. In 34th Annual Symposium on Foundations of Computer Science, pages 670\u2013679, November 1993.","DOI":"10.1109\/SFCS.1993.366820"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Juan A. Garay. Reaching (and maintaining) agreement in the presence of mobile faults. To be presented in WDAG, 1994.","DOI":"10.1007\/BFb0020438"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Shafi Goldwasser, and Silvio Micali. On the cryptographic applications of random functions. In Advances in Cryptology: Proc. of Crypto 84, pages 276\u2013288, 1984.","DOI":"10.1007\/3-540-39568-7_22"},{"issue":"4","key":"38_CR11","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 33(4):792\u2013807, 1986. Extended abstract in FOCS84.","journal-title":"J. ACM"},{"key":"38_CR12","unstructured":"John H\u00e4stad, Russell Impagliazzo, Leonid Levin, and Mike Luby. Construction of pseudo-random generator from any one-way functions. Manuscript, see preliminary versions by Impagliazzo et al. in 21st STOC and H\u00e4stad in 22nd STOC, 1993."},{"issue":"1","key":"38_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/0167-4048(93)90013-U","volume":"12","author":"T. A. Longstaff","year":"1993","unstructured":"Thomas A. Longstaff and Schultz E. Eugene. Beyond preliminary analysis of the wank and oilz worms: A case of study of malicious code. Computers and Security, 12(1):61\u201377, 1993.","journal-title":"Computers and Security"},{"key":"38_CR14","unstructured":"S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. In Project Athena Technical Plan. Massachusetts Institute of Technology, July 1987."},{"issue":"11","key":"38_CR15","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. H. Morris","year":"1979","unstructured":"R. H. Morris and K. Thompson. Unix password security. Comm. ACM, 22(11):594\u2013597, November 1979.","journal-title":"Comm. ACM"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Rafail Ostrovsky and Moti Yung. How to withstand mobile virus attacks. In Proceedings of the 10 th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, pages 51\u201359, 1991.","DOI":"10.1145\/112600.112605"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"R. Reischuk. A new solution to the byzantine generals problem. Information and Control, pages 23\u201342, 1985.","DOI":"10.1016\/S0019-9958(85)80042-5"},{"issue":"6","key":"38_CR18","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/0167-4048(88)90003-X","volume":"7","author":"C. Stoll","year":"1988","unstructured":"Cliff Stoll. How secure are computers in the u.s.a.? Computers and Security, 7(6):543\u2013547, 1988.","journal-title":"Computers and Security"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:02:51Z","timestamp":1737356571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_38","relation":{},"subject":[]}}