-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
Ittai Abraham, Danny Dolev, Rica Gonen, and Joe Halper. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Principles of Distributed Computing(PODC), 2006.
-
(2006)
Principles of Distributed Computing(PODC)
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halper, J.4
-
4
-
-
33845592189
-
Scaling Byzantine fault-tolerant replication to wide area networks
-
Citeseer
-
Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru, J. Olsen, and D. Zage. Scaling Byzantine fault-tolerant replication to wide area networks. In Proc. Int. Conf. on Dependable Systems and Networks, pages 105-114. Citeseer, 2006.
-
(2006)
Proc. Int. Conf. on Dependable Systems and Networks
, pp. 105-114
-
-
Amir, Y.1
Danilov, C.2
Dolev, D.3
Kirsch, J.4
Lane, J.5
Nita-Rotaru, C.6
Olsen, J.7
Zage, D.8
-
6
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002.
-
(2002)
ACM Transactions on Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
7
-
-
0022198802
-
The bit extraction problem of t-resilient functions
-
(preliminary version).IEEE
-
Benny Chor, Oded Goldreich, Johan Håstad, Joel Friedman, Steven Rudich, and Roman Smolensky. The bit extraction problem of t-resilient functions (preliminary version). In FOCS, pages 396-407. IEEE, 1985.
-
(1985)
FOCS
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Håstad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
8
-
-
85026654819
-
Making Byzantine fault tolerant systems tolerate Byzantine faults
-
A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. Making Byzantine fault tolerant systems tolerate Byzantine faults. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, 2009.
-
(2009)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
-
-
Clement, A.1
Wong, E.2
Alvisi, L.3
Dahlin, M.4
Marchetti, M.5
-
9
-
-
84860583472
-
Byzantine fault tolerance: The time is now
-
New York, NY, USA, ACM
-
Allen Clement, Mirco Marchetti, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin. Byzantine fault tolerance: the time is now. In LADIS'08: Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, pages 1-4, New York, NY, USA, 2008. ACM.
-
(2008)
LADIS'08: Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware
, pp. 1-4
-
-
Clement, A.1
Marchetti, M.2
Wong, E.3
Alvisi, L.4
Dahlin, M.5
-
10
-
-
36049020239
-
Hq replication: A hybrid quorum protocol for Byzantine fault tolerance
-
San Diego, CA, USA
-
J. Cowling, D. Myers, B. Liskov, R. Rodrigues and L. Shrira. Hq replication: A hybrid quorum protocol for Byzantine fault tolerance. In In Proceedings of Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, 2005.
-
(2005)
Proceedings of Operating Systems Design and Implementation (OSDI)
-
-
Cowling, J.1
Myers, D.2
Liskov, B.3
Rodrigues, R.4
Shrira, L.5
-
11
-
-
0021976090
-
Bounds on information exchange for Byzantine agreement
-
Danny Dolev and R̈udiger Reischuk. Bounds on information exchange for Byzantine agreement. J. ACM, 32(1):191-204, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.1
, pp. 191-204
-
-
Dolev, D.1
Reischuk, R.2
-
13
-
-
44449163037
-
Almost-everywhere secure computation
-
Juan A. Garay and Rafail Ostrovsky. Almost-everywhere secure computation. In EUROCRYPT, pages 307-323, 2008.
-
(2008)
EUROCRYPT
, pp. 307-323
-
-
Garay, J.A.1
Ostrovsky, R.2
-
14
-
-
51649126675
-
Lower bound for scalable Byzantine agreement
-
Dan Holtby, Bruce M. Kapron, and Valerie King. Lower bound for scalable Byzantine agreement. Distributed Computing, 21(4):239-248, 2008.
-
(2008)
Distributed Computing
, vol.21
, Issue.4
, pp. 239-248
-
-
Holtby, D.1
Kapron, B.M.2
King, V.3
-
16
-
-
77956244948
-
Scalable algorithms for Byzantine agreement and leader election with full information
-
Bruce Kapron, David Kempe, Valerie King, Jared Saia, and Vishal Sanwalani. Scalable algorithms for Byzantine agreement and leader election with full information. ACM Transactions on Algorithms(TALG), 2009.
-
(2009)
ACM Transactions on Algorithms(TALG)
-
-
Kapron, B.1
Kempe, D.2
King, V.3
Saia, J.4
Sanwalani, V.5
-
21
-
-
70450015331
-
Zyzzyva: Speculative Byzantine fault tolerance
-
ACM
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: speculative Byzantine fault tolerance. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, page 58. ACM, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
, pp. 58
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
22
-
-
0030703957
-
Unreliable intrusion detection in distributed computations
-
Dahlia Malkhi and Michael Reiter. Unreliable intrusion detection in distributed computations. In In Computer Security Foundations Workshop, pages 116-124, 1997.
-
(1997)
Computer Security Foundations Workshop
, pp. 116-124
-
-
Malkhi, D.1
Reiter, M.2
-
23
-
-
0019608784
-
On sharing secrets and reed-solomon codes
-
R. J. McEliece and D. V. Sarwate. On sharing secrets and reed-solomon codes. Commun. ACM, 24(9):583-584, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
25
-
-
84943547553
-
Pond: The OceanStore prototype
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao and J. Kubiatowicz. Pond: the OceanStore prototype. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 1-14, 2003.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 1-14
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
26
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi, A. Perrig, et al. Designing secure sensor networks. IEEE Wireless Communications, 11(6):38-43, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
27
-
-
67650067144
-
Contemporary approaches to fault tolerance
-
A. Wright. Contemporary approaches to fault tolerance. Communications of the ACM, 52(7):13-15, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.7
, pp. 13-15
-
-
Wright, A.1
|