-
1
-
-
38049030341
-
Bounded Wait-free Implementation of Optimally Resilient Byzantine Storage without (Unproven) Cryptographic Assumptions
-
Technical Report TR-07-32, University of Texas at Austin, Department of Computer Sciences July
-
Aiyer, A., Alvisi, L., Bazzi, R.A.: Bounded Wait-free Implementation of Optimally Resilient Byzantine Storage without (Unproven) Cryptographic Assumptions. Technical Report TR-07-32, University of Texas at Austin, Department of Computer Sciences (July 2007)
-
(2007)
-
-
Aiyer, A.1
Alvisi, L.2
Bazzi, R.A.3
-
2
-
-
35048817626
-
-
Bazzi, R.A., Ding, Y.: Non-skipping timestamps for byzantine data storage systems. In: Guerraoui, R. (ed.) DISC 2004. LNCS, 3274, pp. 405-419. Springer, Heidelberg (2004)
-
Bazzi, R.A., Ding, Y.: Non-skipping timestamps for byzantine data storage systems. In: Guerraoui, R. (ed.) DISC 2004. LNCS, vol. 3274, pp. 405-419. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
33845203330
-
-
Bazzi, R.A., Ding, Y.: Bounded wait-free f-resilient atomic byzantine data storage systems for an unbounded number of clients. In: Dolev, S. (ed.) DISC 2006. LNCS, 4167, pp. 299-313. Springer, Heidelberg (2006)
-
Bazzi, R.A., Ding, Y.: Bounded wait-free f-resilient atomic byzantine data storage systems for an unbounded number of clients. In: Dolev, S. (ed.) DISC 2006. LNCS, vol. 4167, pp. 299-313. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
33845562065
-
-
Cachin, C., Tessaro, S.: Optimal resilience for erasure-coded byzantine distributed storage. In: DSN, Washington, DC, USA, pp. 115-124. IEEE Computer Society Press, Los Alamitos (2006)
-
Cachin, C., Tessaro, S.: Optimal resilience for erasure-coded byzantine distributed storage. In: DSN, Washington, DC, USA, pp. 115-124. IEEE Computer Society Press, Los Alamitos (2006)
-
-
-
-
5
-
-
35248876689
-
-
Fan, R., Lynch, N.: Efficient replication of large data objects. In: Fich, F.E. (ed.) DISC 2003. LNCS, 2848, pp. 75-91. Springer, Heidelberg (2003)
-
Fan, R., Lynch, N.: Efficient replication of large data objects. In: Fich, F.E. (ed.) DISC 2003. LNCS, vol. 2848, pp. 75-91. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
36849078265
-
Refined Quorum Systems
-
Technical Report LPD-REPORT-2007-001, EPFL
-
Guerraoui, R., Vukolic, M.: Refined Quorum Systems. Technical Report LPD-REPORT-2007-001, EPFL (2007)
-
(2007)
-
-
Guerraoui, R.1
Vukolic, M.2
-
8
-
-
0022873767
-
On interprocess communication, part i: Basic formalism
-
Lamport, L.: On interprocess communication, part i: Basic formalism. Distributed Computing 1(2), 77-101 (1986)
-
(1986)
Distributed Computing
, vol.1
, Issue.2
, pp. 77-101
-
-
Lamport, L.1
-
9
-
-
38049073931
-
-
Liskov, B., Rodrigues, R.: Byzantine clients rendered harmless. In: Fraigniaud, P. (ed.) DISC 2005. LNCS, 3724, pp. 311-325. Springer, Heidelberg (2005)
-
Liskov, B., Rodrigues, R.: Byzantine clients rendered harmless. In: Fraigniaud, P. (ed.) DISC 2005. LNCS, vol. 3724, pp. 311-325. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
84947286466
-
-
Martin, J.-P., Alvisi, L., Dahlin, M.: Minimal byzantine storage. In: Malkhi, D. (ed.) DISC 2002. LNCS, 2508, pp. 311-325. Springer, Heidelberg (2002)
-
Martin, J.-P., Alvisi, L., Dahlin, M.: Minimal byzantine storage. In: Malkhi, D. (ed.) DISC 2002. LNCS, vol. 2508, pp. 311-325. Springer, Heidelberg (2002)
-
-
-
-
11
-
-
0024141971
-
How to share a secret with cheaters
-
Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 1(2), 133-138 (1988)
-
(1988)
J. Cryptol
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
|