Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Christian Cachin
2010 – today
- 2013
[i11]Christian Cachin, Olga Ohrimenko: On Verifying the Consistency of Remote Untrusted Services. CoRR abs/1302.4808 (2013)
[i10]Christian Cachin, Dan Dobre, Marko Vukolic: BFT Storage with 2t+1 Data Replicas. CoRR abs/1305.4868 (2013)
[i9]Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti: Policy-based Secure Deletion. IACR Cryptology ePrint Archive 2013: 152 (2013)- 2012
[c52]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky: Robust data sharing with key-value stores. DSN 2012: 1-12
[c51]Christian Cachin, Birgit Junker, Alessandro Sorniotti: On limitations of using cloud storage for data replication. DSN Workshops 2012: 1-6
[c50]Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, Klaus Stengel: CheapBFT: resource-efficient byzantine fault tolerance. EuroSys 2012: 295-308
[c49]Christian Cachin: Sicherheits-Forschung für die Cloud - Heisse Luft oder Wolke Sieben? Sicherheit 2012: 1- 2011
[b1]Christian Cachin, Rachid Guerraoui, Luís Rodrigues: Introduction to Reliable and Secure Distributed Programming (2. ed.). Springer 2011, ISBN 978-3-642-15259-7, pp. I-XIX, 1-367
[j10]Christian Cachin, Idit Keidar, Alexander Shraer: Fail-Aware Untrusted Storage. SIAM J. Comput. 40(2): 493-533 (2011)
[c48]Anil Kurmus, Moitrayee Gupta, Roman Pletka, Christian Cachin, Robert Haas: A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds. Middleware 2011: 471-490
[c47]Matthias Majuntke, Dan Dobre, Christian Cachin, Neeraj Suri: Fork-Consistent Constructions from Registers. OPODIS 2011: 283-298
[c46]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Marko Vukolic: Robust data sharing with key-value stores. PODC 2011: 221-222
[c45]Christian Cachin: Integrity and Consistency for Untrusted Services - (Extended Abstract). SOFSEM 2011: 1-14
[e4]Christian Cachin, Thomas Ristenpart (Eds.): Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1004-8
[r2]Christian Cachin: Digital Steganography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 348-352- 2010
[j9]Christian Cachin, Jan Camenisch: Encrypting Keys Securely. IEEE Security & Privacy 8(4): 66-69 (2010)
[c44]Alexander Shraer, Christian Cachin, Asaf Cidon, Idit Keidar, Yan Michalevsky, Dani Shaket: Venus: verification for untrusted cloud storage. CCSW 2010: 19-30
[c43]Mathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek, Marko Vukolic: Design and Implementation of a Key-Lifecycle Management System. Financial Cryptography 2010: 160-174
[c42]
2000 – 2009
- 2009
[j8]Christian Cachin, Idit Keidar, Alexander Shraer: Fork sequential consistency is blocking. Inf. Process. Lett. 109(7): 360-364 (2009)
[j7]Christian Cachin, Idit Keidar, Alexander Shraer: Trusting the cloud. SIGACT News 40(2): 81-86 (2009)
[j6]
[c41]
[c40]
[c39]
[c38]- 2008
[c37]Christian Cachin, Idit Keidar, Alexander Shraer: Principles of untrusted storage: a new look at consistency conditions. PODC 2008: 426
[i8]Christian Cachin, Idit Keidar, Alexander Shraer: Fork Sequential Consistency is Blocking. CoRR abs/0805.2068 (2008)- 2007
[c36]Roman Pletka, Christian Cachin: Cryptographic Security for a High-Performance Distributed File System. MSST 2007: 227-232
[c35]Christian Cachin, Abhi Shelat, Alexander Shraer: Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138
[e3]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman (Eds.): From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007
[e2]Lars Arge, Christian Cachin, Tomasz Jurdzinski, Andrzej Tarlecki (Eds.): Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4596, Springer 2007, ISBN 978-3-540-73419-2- 2006
[j5]Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4): 54-62 (2006)
[c34]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006
[c33]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006
[c32]Christian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DSN 2006: 115-124
[c31]Michael Backes, Christian Cachin, Alina Oprea: Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346
[i7]HariGovind V. Ramasamy, Christian Cachin: Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. IACR Cryptology ePrint Archive 2006: 82 (2006)- 2005
[j4]Christian Cachin, Klaus Kursawe, Victor Shoup: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. J. Cryptology 18(3): 219-246 (2005)
[c30]HariGovind V. Ramasamy, Christian Cachin: Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. OPODIS 2005: 88-102
[c29]Michael Backes, Christian Cachin, Alina Oprea: Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11
[c28]
[c27]
[c26]Christian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DISC 2005: 497-498
[c25]Christian Cachin, Stefano Tessaro: Asynchronous Verifiable Information Dispersal. DISC 2005: 503-504
[r1]
[i6]Michael Backes, Christian Cachin, Alina Oprea: Secure Key-Updating for Lazy Revocation. IACR Cryptology ePrint Archive 2005: 334 (2005)- 2004
[j3]Christian Cachin: An information-theoretic model for steganography. Inf. Comput. 192(1): 41-56 (2004)
[c24]
[c23]
[e1]Christian Cachin, Jan Camenisch (Eds.): Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Lecture Notes in Computer Science 3027, Springer 2004, ISBN 3-540-21935-8- 2003
[c22]Christian Cachin: Modeling Complexity in Secure Distributed Computing. Future Directions in Distributed Computing 2003: 57-61
[c21]Michael Backes, Christian Cachin: Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46
[c20]Christian Cachin: An asynchronous protocol for distributed computation of RSA inverses and its applications. PODC 2003: 153-162
[c19]Michael Backes, Christian Cachin, Reto Strobl: Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232
[i5]Michael Backes, Christian Cachin: Public-Key Steganography with Active Attacks. IACR Cryptology ePrint Archive 2003: 231 (2003)- 2002
[c18]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl: Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88-97
[c17]Christian Cachin, Jonathan A. Poritz: Secure Intrusion-tolerant Replication on the Internet. DSN 2002: 167-176
[i4]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl: Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. IACR Cryptology ePrint Archive 2002: 134 (2002)- 2001
[c16]Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup: Secure and Efficient Asynchronous Broadcast Protocols. CRYPTO 2001: 524-541
[c15]
[c14]Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11
[i3]Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup: Secure and Efficient Asynchronous Broadcast Protocols. IACR Cryptology ePrint Archive 2001: 6 (2001)- 2000
[c13]
[c12]Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller: One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523
[c11]Christian Cachin, Klaus Kursawe, Victor Shoup: Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). PODC 2000: 123-132
[i2]Christian Cachin: An Information-Theoretic Model for Steganography. IACR Cryptology ePrint Archive 2000: 28 (2000)
[i1]Christian Cachin, Klaus Kursawe, Victor Shoup: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography. IACR Cryptology ePrint Archive 2000: 34 (2000)
1990 – 1999
- 1999
[c10]Christian Cachin: Efficient Private Bidding and Auctions with an Oblivious Third Party. ACM Conference on Computer and Communications Security 1999: 120-127
[c9]Christian Cachin, Silvio Micali, Markus Stadler: Computationally Private Information Retrieval with Polylogarithmic Communication. EUROCRYPT 1999: 402-414- 1998
[c8]
[c7]Christian Cachin, Claude Crépeau, Julien Marcil: Oblivious Transfer with a Memory-Bounded Receiver. FOCS 1998: 493-502
[c6]Christian Cachin: An Information-Theoretic Model for Steganography. Information Hiding 1998: 306-318- 1997
[j2]Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification. J. Cryptology 10(2): 97-110 (1997)
[c5]Christian Cachin, Ueli M. Maurer: Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306
[c4]- 1995
[c3]- 1994
[j1]
[c2]Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274- 1993
[c1]Matthias Rauterberg, Christian Cachin: Locating the Primary Attention Focus of the User. VCHCI 1993: 129-140
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:18 CEST by the dblp team



