-
1
-
-
4244062863
-
Authenticated byzantine fault tolerance without public-key cryptography
-
MIT
-
B. Liskov and M. Castro, "Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography", Tech. Rep./LCS/TM-595, MIT, 1999.
-
(1999)
Tech. Rep.
, vol.LCS-TM-595
-
-
Liskov, B.1
Castro, M.2
-
2
-
-
0033335116
-
On diffusing updates in byzantine environment
-
Lausanne
-
D. Malkhi, Y. Mansour and M. Reiter, "On diffusing Updates in Byzantine Environment," in Proc. 18th IEEE Symp. on Reliable Distributed Systems, Lausanne, 1999, pp.134-143.
-
(1999)
Proc. 18th IEEE Symp. on Reliable Distributed Systems
, pp. 134-143
-
-
Malkhi, D.1
Mansour, Y.2
Reiter, M.3
-
3
-
-
0035198939
-
Efficient update diffusion in byzantine environments
-
New Orleans
-
D. Malkhi, M. Reiter, O. Rodeh and Y. Sella, "Efficient Update Diffusion in Byzantine Environments," in Proc. 20th IEEE Symposium on Reliable Distributed Systems, New Orleans, 2001, pp.90-98.
-
(2001)
Proc. 20th IEEE Symposium on Reliable Distributed Systems
, pp. 90-98
-
-
Malkhi, D.1
Reiter, M.2
Rodeh, O.3
Sella, Y.4
-
4
-
-
0037303962
-
Tolerating malicious gossip
-
February
-
Y. Minsky and F. Schneider, "Tolerating Malicious Gossip," in The Distributed Computing Journal, vol. 16(1), pp.49-68, February 2003.
-
(2003)
The Distributed Computing Journal
, vol.16
, Issue.1
, pp. 49-68
-
-
Minsky, Y.1
Schneider, F.2
-
5
-
-
84956986541
-
Optimal unconditional information diffusion
-
Lisbon
-
D. Malkhi, E. Pavlov and Y. Sella, "Optimal Unconditional Information Diffusion," in Proc. 15th International Symposium on Distributed Computing, Lisbon, 2001, pp.63-77.
-
(2001)
Proc. 15th International Symposium on Distributed Computing
, pp. 63-77
-
-
Malkhi, D.1
Pavlov, E.2
Sella, Y.3
-
6
-
-
4544304739
-
Collective endorsement and the dissemination problem in malicious environments
-
Georgia Tech
-
S. Lakshmanan, D.J. Manohar, M. Ahamad and H. Venkateswaran, "Collective Endorsement and the Dissemination Problem in Malicious Environments," Tech. Rep. GIT-CERCS-04-10, Georgia Tech, 2004.
-
(2004)
Tech. Rep.
, vol.GIT-CERCS-04-10
-
-
Lakshmanan, S.1
Manohar, D.J.2
Ahamad, M.3
Venkateswaran, H.4
-
8
-
-
0002112484
-
Epidemic algorithms for replicated database maintenance
-
A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart and D. Terry, "Epidemic Algorithms for replicated database maintenance," in Operating Systems Review, vol. 22, pp.8-32, 1988.
-
(1988)
Operating Systems Review
, vol.22
, pp. 8-32
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
9
-
-
0031541392
-
Flexible update propagation for weakly consistent replication
-
K. Petersen, M.J. Spreitzer, D. Terry, M. Theimer and A. Demers, "Flexible Update Propagation for Weakly Consistent Replication," in Proc. of ACM SOSP, 1997, pp.288-301.
-
(1997)
Proc. of ACM SOSP
, pp. 288-301
-
-
Petersen, K.1
Spreitzer, M.J.2
Terry, D.3
Theimer, M.4
Demers, A.5
-
10
-
-
0003517649
-
Weak-consistency group communication and membership
-
PhD thesis, UC Santa Cruz, CA, USA, Dec.
-
R.A. Golding, "Weak-Consistency Group Communication and Membership," PhD thesis, UC Santa Cruz, CA, USA, Tech. Rep. UCSC-CRL92 -52, Dec. 1992.
-
(1992)
Tech. Rep.
, vol.UCSC-CRL92 -52
-
-
Golding, R.A.1
-
12
-
-
84957705890
-
Efficient buffering in reliable multicast protocols
-
Pisa, Springer-Verlag
-
O. Ozkasap, R. Renesse, K. Birman and Z. Xiao, "Efficient buffering in reliable multicast protocols," in Proc. of the First International Workshop on Networked Group Communication, Pisa, 1999, pp. 188-203. Springer-Verlag.
-
(1999)
Proc. of the First International Workshop on Networked Group Communication
, pp. 188-203
-
-
Ozkasap, O.1
Renesse, R.2
Birman, K.3
Xiao, Z.4
-
13
-
-
0032178082
-
Secure group communication using key graphs
-
Vancouver
-
C. K. Wong, M. Gouda and S. Lam, "Secure Group Communication Using Key Graphs," in Proc. of ACM SIGCOMM, Vancouver, 1998, pp.68-79.
-
(1998)
Proc. of ACM SIGCOMM
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
-
14
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," in Proc. of INFOCOM, New York, 1999, pp.708-716.
-
(1999)
Proc. of INFOCOM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
16
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak and M. Pease, "The Byzantine Generals Problem," in ACM Transactions on Programming Languages and Systems, vol.4(3), pp.382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
17
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
October
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, "Perfectly Secure Key Distribution for Dynamic Conferences," in Information and Computation, vol.146(1), pp.1-23, October 1998.
-
(1998)
Information and Computation
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
18
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley
-
H. Chan, A. Perrig and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, Berkeley, 2003, pp.197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
|