@article{Zhou:2005:APS:1085126.1085127,
 author = {Zhou, Lidong and Schneider, Fred B. and Van Renesse, Robbert},
 title = {APSS: proactive secret sharing in asynchronous systems},
 journal = {ACM Trans. Inf. Syst. Secur.},
 volume = {8},
 issue = {3},
 month = {August},
 year = {2005},
 issn = {1094-9224},
 pages = {259--286},
 numpages = {28},
 url = {http://doi.acm.org/10.1145/1085126.1085127},
 doi = {http://doi.acm.org/10.1145/1085126.1085127},
 acmid = {1085127},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {Threshold cryptography, asynchronous system, denial of service, proactive secret sharing},
} 

@article{ds-final-project,
  author = {Google project : CS 505 Final},
  title = {http://code.google.com/p/ds-final}
}

@article{ws-wsdl,
  author = {WSDL of the Server},
  title = {http://ds-final.googlecode.com/svn/java/ws/ds-final-ws/files/server.wsdl}
}

@article{axis2,
  author = {Apache Axis 2},
  title = {http://axis.apache.org/axis2/java/core/}
}

@article{Shamir79,
 author = {Shamir, Adi},
 title = {How to share a secret},
 journal = {Commun. ACM},
 volume = {22},
 issue = {11},
 month = {November},
 year = {1979},
 issn = {0001-0782},
 pages = {612--613},
 numpages = {2},
 url = {http://doi.acm.org/10.1145/359168.359176},
 doi = {http://doi.acm.org/10.1145/359168.359176},
 acmid = {359176},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cryptography, interpolation, key management},
} 

@article {Ito87,
author = {Ito, Mitsuru and Saito, Akira and Nishizeki, Takao},
title = {Secret sharing scheme realizing general access structure},
journal = {Electronics and Communications in Japan (Part III: Fundamental Electronic Science)},
volume = {72},
number = {9},
publisher = {Wiley Subscription Services, Inc., A Wiley Company},
issn = {1520-6440},
url = {http://dx.doi.org/10.1002/ecjc.4430720906},
doi = {10.1002/ecjc.4430720906},
pages = {56--64},
year = {1989},
}

@inproceedings{Pedersen91,
 author = {Pedersen, Torben P.},
 title = {Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing},
 booktitle = {Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology},
 series = {CRYPTO '91},
 year = {1992},
 isbn = {3-540-55188-3},
 pages = {129--140},
 numpages = {12},
 url = {http://dl.acm.org/citation.cfm?id=646756.705507},
 acmid = {705507},
 publisher = {Springer-Verlag},
 address = {London, UK},
} 

@article{RSA,
 author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
 title = {A method for obtaining digital signatures and public-key cryptosystems},
 journal = {Commun. ACM},
 volume = {21},
 issue = {2},
 month = {February},
 year = {1978},
 issn = {0001-0782},
 pages = {120--126},
 numpages = {7},
 url = {http://doi.acm.org/10.1145/359340.359342},
 doi = {http://doi.acm.org/10.1145/359340.359342},
 acmid = {359342},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {authentication, cryptography, digital signatures, electronic funds transfer, electronic mail, factorization, message-passing, prime number, privacy, public-key cryptosystems, security},
} 
