-
1
-
-
0038416064
-
Skip graphs
-
Aspnes, J., Shah, G.: Skip graphs. In: SODA, pp. 384-393 (2003)
-
(2003)
SODA
, pp. 384-393
-
-
Aspnes, J.1
Shah, G.2
-
3
-
-
78751661889
-
Provably secure distributed name service
-
Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.), ICALP 2009, Springer, Heidelberg
-
Awerbuch, B., Scheideler, C.: Provably secure distributed name service. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009. LNCS, vol. 5556, Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5556
-
-
Awerbuch, B.1
Scheideler, C.2
-
4
-
-
23944493621
-
Robust distributed name service
-
Voelker, G.M., Shenker, S. (eds.), IPTPS 2004, Springer, Heidelberg
-
Awerbuch, B., Scheideler, C.: Robust distributed name service. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 237-249. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3279
, pp. 237-249
-
-
Awerbuch, B.1
Scheideler, C.2
-
5
-
-
33749571809
-
Towards a scalable and robust DHT
-
Awerbuch, B., Scheideler, C.: Towards a Scalable and Robust DHT. In: SPAA, pp. 318-327 (2006)
-
(2006)
SPAA
, pp. 318-327
-
-
Awerbuch, B.1
Scheideler, C.2
-
6
-
-
67449124556
-
Towards a scalable and robust DHT
-
Awerbuch, B., Scheideler, C.: Towards a scalable and robust DHT. Theory Comput. Syst. 45(2), 234-260 (2009)
-
(2009)
Theory Comput. Syst.
, vol.45
, Issue.2
, pp. 234-260
-
-
Awerbuch, B.1
Scheideler, C.2
-
7
-
-
0042033407
-
Fault tolerance in networks of bounded degree
-
Dwork, C., Peleg, D., Pippenger, N., Upfal, E.: Fault tolerance in networks of bounded degree. In: STOC, pp. 370-379 (1986)
-
(1986)
STOC
, pp. 370-379
-
-
Dwork, C.1
Peleg, D.2
Pippenger, N.3
Upfal, E.4
-
8
-
-
27144478012
-
Making chord robust to byzantine attacks
-
Brodal, G.S., Leonardi, S. (eds.), ESA 2005, Springer, Heidelberg
-
Fiat, A., Saia, J., Young, M.: Making chord robust to byzantine attacks. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, vol. 3669, pp. 803-814. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3669
, pp. 803-814
-
-
Fiat, A.1
Saia, J.2
Young, M.3
-
9
-
-
33749553752
-
Random selection with an adversarial majority
-
Dwork, C. (ed.) CRYPTO 2006, Springer, Heidelberg
-
Gradwohl, R., Vadhan, S.P., Zuckerman, D.: Random selection with an adversarial majority. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 409-426
-
-
Gradwohl, R.1
Vadhan, S.P.2
Zuckerman, D.3
-
10
-
-
57949113684
-
Fast asynchronous byzantine agreement and leader election with full information
-
Kapron, B.M., Kempe, D., King, V., Saia, J., Sanwalani, V.: Fast asynchronous byzantine agreement and leader election with full information. In: SODA, pp. 1038-1047 (2008)
-
(2008)
SODA
, pp. 1038-1047
-
-
Kapron, B.M.1
Kempe, D.2
King, V.3
Saia, J.4
Sanwalani, V.5
-
11
-
-
76649119750
-
From almost everywhere to everywhere: Byzantine agreement with ∼o(n3/2) bits
-
Keidar, I. (ed.) DISC 2009, Springer, Heidelberg
-
King, V., Saia, J.: From almost everywhere to everywhere: Byzantine agreement with ∼O(n3/2) bits. In: Keidar, I. (ed.) DISC 2009. LNCS, vol. 5805, pp. 464-478. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5805
, pp. 464-478
-
-
King, V.1
Saia, J.2
-
12
-
-
77956253063
-
Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary
-
King, V., Saia, J.: Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary. In: PODC, pp. 420-429 (2010)
-
(2010)
PODC
, pp. 420-429
-
-
King, V.1
Saia, J.2
-
13
-
-
33244463798
-
Scalable leader election
-
King, V., Saia, J., Sanwalani, V., Vee, E.: Scalable leader election. In: SODA, pp. 990-999 (2006)
-
(2006)
SODA
, pp. 990-999
-
-
King, V.1
Saia, J.2
Sanwalani, V.3
Vee, E.4
-
14
-
-
38049008242
-
Towards secure and scalable computation in peer-to-peer networks
-
King, V., Saia, J., Sanwalani, V., Vee, E.: Towards secure and scalable computation in peer-to-peer networks. In: FOCS, pp. 87-98 (2006)
-
(2006)
FOCS
, pp. 87-98
-
-
King, V.1
Saia, J.2
Sanwalani, V.3
Vee, E.4
-
15
-
-
27144447960
-
How to spread adversarial nodes? Rotate!
-
Scheideler, C.: How to Spread Adversarial Nodes? Rotate! In: STOC, pp. 704-713 (2005)
-
(2005)
STOC
, pp. 704-713
-
-
Scheideler, C.1
-
16
-
-
0026995984
-
Tolerating linear number of faults in networks of bounded degree
-
Upfal, E.: Tolerating linear number of faults in networks of bounded degree. In: PODC, pp. 83-89 (1992)
-
(1992)
PODC
, pp. 83-89
-
-
Upfal, E.1
-
17
-
-
77955963220
-
Practical robust communication in DHTs tolerating a byzantine adversary
-
IEEE, Los Alamitos
-
Young, M., Kate, A., Goldberg, I., Karsten, M.: Practical robust communication in DHTs tolerating a byzantine adversary. In: ICDCS, pp. 263-272. IEEE, Los Alamitos (2010)
-
(2010)
ICDCS
, pp. 263-272
-
-
Young, M.1
Kate, A.2
Goldberg, I.3
Karsten, M.4
-
18
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
Zuckerman, D.: Randomness-optimal oblivious sampling. Random Struct. Algorithms 11(4), 345-367 (1997) (Pubitemid 127345393)
-
(1997)
Random Structures and Algorithms
, vol.11
, Issue.4
, pp. 345-367
-
-
Zuckerman, D.1
|