Scalability and flexibility in authentication services: The KryptoKnight approachP. JansonG. Tsudiket al.1997INFOCOM 1997
Certifying permutations: noninteractive zero-knowledge based on any trapdoor permutationMihir BellareMoti Yung1996Journal of Cryptology
'Time-driven priority' flow control for real-time heterogeneous internetworkingC.-S. LiYoram Ofeket al.1996IEEE INFOCOM 1996
Integrated MetaNet Architecture: a switch-based multimedia LAN for parallel computing and real-time trafficYoram OfekMoti Yung1994IEEE INFOCOM 1994
Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedbackYvo DesmedtYair Frankelet al.1992IEEE INFOCOM 1992
Lossless asynchronous broadcast-with-feedback on the MetaNet architectureYoram OfekMoti Yung1991IEEE INFOCOM 1991
Principles for high speed network control. Loss-less and deadlock-freeness, self-routing and a single buffer per linkYoram OfekMoti Yung1990PODC 1990
Public-key cryptosystems provably secure against chosen ciphertext attacksMoni NaorMoti Yung1990STOC 1990
Perfectly Secure Key Distribution for Dynamic ConferencesCarlo BlundoAlfredo De Santiset al.1998Information and Computation