References

E

Previous |

Next

ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. In Proc. of Advances in Cryptology- CRYPTO'84, pages 10- 18. Springer-Verlag.

Ellison, C. and Schneier, B. (2000). Ten risks of pki: What you're not being told about public key infrastructure. Computer Security Journal, XVI(1).

Elnozahy, E., Alvizi, L., Wang, Y., and Johnson, D. (1999). A survey of rollback- recover protocols in message-passing systems. Technical Report CMU-CS-99-148, Carnegie Mellon University.

Elnozahy, E. andZwaenepoel, W. (1992a). Manetho: Transparent Rollback-Recovery with Low Overhead, Limited Rollback and Fast Output Commit. IEEE Transactions on Computers, 41(5):526-531.

Elnozahy, E.andZwaenepoel, W. (1992b). Replicated distributed process in Manetho. In Digest of Papers, The 22nd IEEE International Symposium on Fault-Tolerant Computing Systems, page 18.

Eppinger, J.and Mummert, L. and Spector, A. (1991). Camelot and Avalon. Morgan Kaufmann Publishers, Inc.

Eswaran, K., Gray, J., Lorie, R., and Traiger, I. (1976). The notions of consistency and predicate locks in a database system. Communics. of the ACM, 19(11):624-633.

Ezhilchelvan, P., Macedo, R., and Shrivastava, S. (1995). Newtop: A fault-tolerant group communication protocol. In Proc. of the 15th IEEE Int'l Conference on Distributed Computing Systems, pages 296-306, Vancouver, Canada.

Previous |

Next