Michael Reiter :: Selected Publications by Forum

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Some citation information for these papers can be found at Google Scholar.

This is not a complete list of my publications. Please see my curriculum vitae for a complete list.

Back to Michael Reiter's home page


ACM Conference on Computer and Communications Security (CCS) [© ACM]
2006 Packet vaccine: Black-box exploit detection and signature generation
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Pages 37–46. doi:10.1145/1180405.1180412
2004 Fragile mixing
M. K. Reiter and X. Wang. Pages 227–235. doi:10.1145/1030083.1030114
Mitigating bandwidth-exhaustion attacks using congestion puzzles
X. Wang and M. K. Reiter. Pages 257–267. doi:10.1145/1030083.1030118
Gray-box extraction of execution graphs for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 318–329. doi:10.1145/1030083.1030126
2003 Automatic generation of two-party computations
P. MacKenzie, A. Oprea, and M. K. Reiter. Pages 210–219. doi:10.1145/948109.948139
2001 Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. Pages 10–19. doi:10.1145/501983.501986
Note: This paper is superceded by the journal version.
1999 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter, and S. Wetzel. Pages 73–82. doi:10.1145/319709.319720
Note: This paper is superceded by the journal version.
1997 Fair exchange with a semi-trusted third party
M. K. Franklin and M. K. Reiter. Pages 1–6. doi:10.1145/266420.266424
Path independence for authentication in large-scale systems
M. K. Reiter and S. G. Stubblebine. Pages 57–66. doi:10.1145/266420.266435
Note: This paper is superceded by the journal version.
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy, and R. N. Wright. Pages 38–47. doi:10.1145/238168.238184
Note: This paper is superceded by the journal version.
1994 Secure agreement protocols: Reliable and atomic group multicast in Rampart
M. K. Reiter. Pages 68–80. doi:10.1145/191177.191194


ACM Conference on Electronic Commerce (EC) [© ACM]
2000 Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose, and M. K. Reiter. Pages 176–184. doi:10.1145/352871.352891


ACM Symposium on Operating Systems Principles (SOSP) [© ACM]
2005 Fault-scalable Byzantine fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. Pages 59–74. doi:10.1145/1095810.1095817


ACM Symposium on Principles of Distributed Computing (PODC) [© ACM]
2006 Quorum placement in networks: Minimizing network congestion
D. Golovin, A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 16–25. doi:10.1145/1146381.1146388
2005 Quorum placement in networks to minimize access delays
A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 87–96. doi:10.1145/1073814.1073829
2001 Selective private function evaluation with applications to private statistics
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright. doi:10.1145/383962.384047
1999 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi, and M. K. Reiter. Pages 257–265. doi:10.1145/301308.301368
Note: This paper is superceded by the journal version.
1997 The load and availability of Byzantine quorum systems
D. Malkhi, M. Reiter, and A. Wool. Pages 249–257. doi:10.1145/259380.259450
Note: This paper is superceded by the journal version.
Probabilistic quorum systems
D. Malkhi, M. Reiter, and R. Wright. Pages 267–273. doi:10.1145/259380.259458
Note: This paper is superceded by the journal version.


ACM Symposium on Theory of Computing (STOC) [© ACM]
1997 Byzantine quorum systems
D. Malkhi and M. Reiter. Pages 569–578. doi:10.1145/258533.258650
Note: This paper is superceded by the journal version.


ACM Transactions on Computer Systems (TOCS) [© ACM]
1994 A security architecture for fault-tolerant systems
M. K. Reiter, K. P. Birman, and R. van Renesse. 12(4):340–371. doi:10.1145/195792.195823


ACM Transactions on Information and System Security (TISSEC) [© ACM]
2001 An authorization model for a public key management service
P. Samarati, M. K. Reiter and S. Jajodia. 4(4):453–482. doi:10.1145/503339.503343
1999 Authentication metric analysis and design
M. K. Reiter and S. G. Stubblebine. 2(2):138–158. doi:10.1145/317087.317088
1998 Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin. 1(1):66–92. doi:10.1145/290163.290168


ACM Transactions on Programming Languages and Systems (TOPLAS) [© ACM]
1994 How to securely replicate services
M. K. Reiter and K. P. Birman. 16(3):986–1009, May 1994. doi:10.1145/177492.177745


Applied Cryptography and Network Security (ACNS) [© Springer-Verlag]
2005 Building reliable mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright. Lecture Notes in Computer Science 3531, pages 378–392. doi:10.1007/11496137_26
2004 Private keyword-based push and pull with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song, and K. Yang. Lecture Notes in Computer Science 3089, pages 16–30.


The Computer Journal [© British Computer Society]
1995 Securing causal relationships in distributed systems
M. K. Reiter and L. Gong. 38(8):633–642. doi:10.1093/comjnl/38.8.633


Computer Networks
1999 On the security of pay-per-click and other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas, and M. K. Reiter. 31(11–16):1091–1100. doi:10.1016/S1389-1286(99)00023-7


Concurrency and Computation: Practice and Experience
2002 Advanced concurrency control in Java
P. Felber and M. K. Reiter. 14(4):261–285. doi:10.1002/cpe.635


CRYPTO [© Springer-Verlag]
2001 Two party generation of DSA signatures
P. MacKenzie and M. K. Reiter. Lecture Notes in Computer Science 2139.
Note: This paper is superceded by the journal version.


DARPA Information Survivability Conference and Exposition [© IEEE]
2001 Persistent objects in the Fleet system
D. Malkhi, M. K. Reiter, D. Tulone, and E. Ziskind. Vol. II, pages 126–136. doi:10.1109/DISCEX.2001.932165


Distributed Computing [© Springer-Verlag]
2003 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter, and G. Taubenfeld. 16(1)37–48. doi:10.1007/s00446-002-0075-3
Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. 16(4):307–327. doi:10.1007/s00446-003-0098-4
1998 Byzantine quorum systems
D. Malkhi and M. Reiter. 11(4):203–213. doi:10.1007/s004460050050


EUROCRYPT [© Springer-Verlag]
1996 Low-exponent RSA with related messages
D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter. Lecture Notes in Computer Science 1070, pages 1–9.
1995 Verifiable signature sharing
M. K. Franklin and M. K. Reiter. Lecture Notes in Computer Science 921, pages 50–63.


European Symposium on Research in Computer Security (ESORICS) [© Springer-Verlag]
2006 Finding peer-to-peer file-sharing using coarse network behaviors
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 1–17. doi:10.1007/11863908_1
A linear logic of authorization and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 297–312. doi:10.1007/11863908_19


IEEE Computer Security Foundations (CSF) [© IEEE]
1997 Unreliable intrusion detection in distributed computations
D. Malkhi and M. Reiter. Pages 116–124. doi:10.1109/CSFW.1997.596799
1996 A high-throughput secure reliable multicast protocol
D. Malki and M. Reiter. Pages 9–17. doi:10.1109/CSFW.1996.503686
Note: This paper is superceded by the journal version.


IEEE International Conference on Network Protocols (ICNP) [© IEEE]
2006 Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang. Pages 43–53. doi:10.1109/ICNP.2006.320197


IEEE International Symposium on High Performance Distributed Computing [© IEEE]
2002 A secure distributed search system
Y. Xie, D. O'Hallaron and M. K. Reiter. Pages 321–330. doi:10.1109/HPDC.2002.1029932


IEEE Symposium on Reliable Distributed Systems (SRDS) [© IEEE]
2006 WRAPS: Denial-of-service defense through web referrals
X. Wang and M. K. Reiter. Pages 51–60. doi:10.1109/SRDS.2006.48
2005 Distributed construction of a fault-tolerant network from a tree
M. K. Reiter, A. Samar and C. Wang. Pages 155–165. doi:10.1109/RELDIS.2005.16
Lazy verification in fault-tolerant distributed storage systems
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. Pages 179–190. doi:10.1109/RELDIS.2005.20
2004 Nested objects in a Byzantine quorum-replicated system
C. P. Fry and M. K. Reiter. Pages 79–89. doi:10.1109/RELDIS.2004.1353005
2003 The design and implementation of a JCA-compliant capture protection infrastructure
M. K. Reiter, A. Samar, and C. Wang. doi:10.1109/RELDIS.2003.1238086
2001 Efficient update diffusion in Byzantine environments
D. Malkhi, M. K. Reiter, O. Rodeh and Y. Sella. Pages 90–98. doi:10.1109/RELDIS.2001.969758
1999 On diffusing updates in a Byzantine environment
D. Malkhi, Y. Mansour, and M. K. Reiter. Pages 134–143. doi:10.1109/RELDIS.1999.805090
Note: This paper is superceded by the journal version.
1998 Survivable consensus objects
D. Malkhi and M. Reiter. Pages 271–279. doi:10.1109/RELDIS.1998.740509
Note: This paper is superceded by the journal version.
Secure and scalable replication in Phalanx
D. Malkhi and M. Reiter. Pages 51–58. doi:10.1109/RELDIS.1998.740474


IEEE Symposium on Security and Privacy (S&P, Oakland) [© IEEE]
2007 Minimal TCB code execution (extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 267–272. doi:10.1109/SP.2007.27
2005 Detection of denial-of-message attacks on sensor network broadcasts
J. M. McCune, E. Shi, A. Perrig and M. K. Reiter. Pages 64–78. doi:10.1109/SP.2005.7
Distributed proving in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 81–95. doi:10.1109/SP.2005.9
Seeing-is-believing: Using camera phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. Pages 110–124. doi:10.1109/SP.2005.19
Worm origin identification using random moonwalks
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter and H. Zhang. Pages 242–256. doi:10.1109/SP.2005.23
2004 An empirical analysis of target-resident DoS filters
M. Collins and M. K. Reiter. Pages 103–114. doi:10.1109/SECPRI.2004.1301318
2003 Defending against denial-of-service attacks with puzzle auctions
X. Wang and M. K. Reiter. Pages 78–92. doi:10.1109/SECPRI.2003.1199329
2001 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. Pages 12–25. doi:10.1109/SECPRI.2001.924284
Note: This paper is superceded by the journal version.
Cryptographic key generation from voice
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Pages 202–213, May 2001. doi:10.1109/SECPRI.2001.924299
1998 Secure execution of Java applets using a remote playground
D. Malkhi, M. Reiter, and A. Rubin. Pages 40–51. doi:10.1109/SECPRI.1998.674822
Note: This paper is superceded by the journal version.
1997 Toward acceptable metrics of authentication
M. K. Reiter and S. G. Stubblebine. Pages 10–20. doi:10.1109/SECPRI.1997.601308
Note: This paper is superceded by the journal version.
1995 The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. Pages 2–14. doi:10.1109/SECPRI.1995.398918
Note: This paper is superceded by the journal version.
1994 A secure group membership protocol
M. K. Reiter. Pages 176–189. doi:10.1109/RISP.1994.296582
Note: This paper is superceded by the journal version.
1993 Preventing denial and forgery of causal relationships in distributed systems
M. K. Reiter and L. Gong. Pages 30–40. doi:10.1109/RISP.1993.287645
Note: This paper is superceded by the journal version.
1992 Integrating security in a group oriented distributed system
M. K. Reiter, K. P. Birman, and L. Gong. Pages 18–32. doi:10.1109/RISP.1992.213273


IEEE Transactions on Computers (TC) [© IEEE]
1998 Resilient authentication using path independence
M. K. Reiter and S. G. Stubblebine. 47(12):1351–1362. doi:10.1109/12.737682


IEEE Transactions on Knowledge and Data Engineering (TKDE) [© IEEE]
2000 An architecture for survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter. 12(2):187–202. doi:10.1109/69.842262


IEEE Transactions on Parallel and Distributed Systems (TPDS) [© IEEE]
2001 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi, and M. K. Reiter. 12(1):7–21. doi:10.1109/71.899936
Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, and M. K. Reiter. 12(9):996–1007. doi:10.1109/71.954640


IEEE Transactions on Software Engineering (TSE) [© IEEE]
2000 Secure execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter. 26(12):1197–1209. doi:10.1109/32.888632
1996 A secure group membership protocol
M. K. Reiter. 22(1):31–42. doi:10.1109/32.481515
The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. 22(5):302–312. doi:10.1109/32.502223


IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) [© IEEE]
2006 A multi-resolution approach for worm detection and containment
V. Sekar, Y. Xie, M. K. Reiter and H. Zhang. Pages 189–198. doi:10.1109/DSN.2006.6
2004 Efficient Byzantine-tolerant erasure-coded storage
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter. doi:10.1109/DSN.2004.1311884
2000 Dynamic Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, M. K. Reiter, and R. N. Wright. Pages 283–292. doi:10.1109/ICDSN.2000.857551


IFIP Working Conference on Dependable Computing for Critical Applications (DCCA) [© IEEE]
1999 Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, L. Pierce, and M. K. Reiter. Pages 357–371. doi:10.1109/DCFTS.1999.814307
Note: This paper is superceded by the journal version.


Information and Computation
2001 Probabilistic quorum systems
D. Malkhi, M. K. Reiter, A. Wool, and R. N. Wright. 170(2): 184–206. doi:10.1006/inco.2001.3054


Information Security Conference (ISC) [© Springer-Verlag]
2004 Device-enabled authorization in the Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Lecture Notes in Computer Science 3650, pages 431–445. doi:10.1007/11556992_31


International Conference on Distributed Computing Systems (ICDCS) [© IEEE]
2006 M2: Multicasting mixes for efficient and anonymous communication
G. Perng, M. K. Reiter and C. Wang. doi:10.1109/ICDCS.2006.53
2001 Backoff protocols for distributed mutual exclusion and ordering
G. Chockler, D. Malkhi, and M. K. Reiter. Pages 11–20. doi:10.1109/ICDSC.2001.918928


International Conference on Financial Cryptography (FC) [© Springer-Verlag]
2004 Timing attacks in low-latency mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright. Lecture Notes in Computer Science 3110, pages 251–265.


International Conference on Information and Communications Security (ICICS) [© Springer-Verlag]
2004 Time-scoped searching of encrypted audit logs
D. Davis, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 3269, pages 532–545.


International Journal of Information Security [© Springer-Verlag]
2004 Two-party generation of DSA signatures
P. MacKenzie and M. K. Reiter. 2(3–4):218–239. doi:10.1007/s10207-004-0041-0
2003 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. 2(1):1–20. doi:10.1007/s10207-003-0022-8
2002 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter, and S. G. Wetzel. 1(2):69–83. doi:10.1007/s102070100006


International Symposium on Distributed Computing (DISC) [© Springer-Verlag]
2006 On consistency of encrypted files
A. Oprea and M. K. Reiter. Lecture Notes in Computer Science 4167, pages 254–268. doi:10.1007/11864219_18
2000 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter, and G. Taubenfeld. Lecture Notes in Computer Science 1914, pages 345–359.
Note: This paper is superceded by the journal version.


International Symposium on Recent Advances in Intrusion Detection (RAID) [© Springer-Verlag]
2006 Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 4219, pages 19–40. doi:10.1007/11856214_2
2005 Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 3858, pages 63–81. doi:10.1007/11663812_4
2004 Seurat: A pointillist approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang. Lecture Notes in Computer Science 3224, pages 238–257.


Internet Society Network and Distributed System Security Symposium (NDSS) [© Internet Society]
2007 Playing devil's advocate: Inferring sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter. Pages 35–47.
Consumable credentials in logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Pages 143–157.
2005 Space-efficient block storage integrity
A. Oprea, M. K. Reiter and K. Yang. Pages 17–28.


Journal of Computer Security
1997 A high-throughput secure reliable multicast protocol
D. Malkhi and M. Reiter. 5:113–127.
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy, and R. N. Wright. 4(4):267–287.


Security and Privacy in Digital Rights Management [© Springer-Verlag]
2002 Discouraging software piracy using software aging
M. Jakobsson and M. K. Reiter. Lecture Notes in Computer Science 2320.


SIAM Journal of Computing
2000 The load and availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter, and A. Wool. 29(6):1889–1906. doi:10.1137/S0097539797325235


A Speaker Odyssey: The Speaker Recognition Workshop
2001 Using voice to generate cryptographic keys
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Pages 237–242.


Theoretical Computer Science
2003 Diffusion without false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. 299(1–3):289–306. doi:10.1016/S0304-3975(02)00325-0


Theory and Practice in Distributed Systems [© Springer-Verlag]
1995 The Rampart toolkit for building high-integrity services
M. K. Reiter. Lecture Notes in Computer Science 938, pages 99–110.


Theory of Cryptography Conference (TCC) [© Springer-Verlag]
2004 Alternatives to non-malleability: Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang. Lecture Notes in Computer Science 2951, pages 171–190.


USENIX Annual Technical Conference
2006 Bump in the ether: A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter. Pages 185–198.


USENIX Security Symposium
2004 On gray-box program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 103–118.
On user choice in graphical password schemes
D. Davis, F. Monrose and M. K. Reiter. Pages 151–164.
2002 Toward speech-generated cryptographic keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih. Pages 283–296.
1999 The design and analysis of graphical passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin, and M. K. Reiter. Pages 1–14.


USENIX Workshop on Electronic Commerce
1998 Detecting hit shaving in click-through payment schemes
M. K. Reiter, V. Anupam, and A. Mayer. Pages 155–166.


Back to top
Back to Michael Reiter's home page