-
1
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys 22(4) (1990) 299-319
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
3
-
-
26044481272
-
Distributed trust: Supporting fault-tolerance and attack-tolerance
-
Cornell University
-
Schneider, F.B., Zhou, L.: Distributed trust: Supporting fault-tolerance and attack-tolerance. Technical Report TR 2004-1924, Cornell University (2004)
-
(2004)
Technical Report TR 2004-1924
-
-
Schneider, F.B.1
Zhou, L.2
-
4
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Journal of the ACM 32(2) (1985) 372-382
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 372-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
6
-
-
0027313816
-
Fast asynchronous byzantine agreement with optimal resilience
-
Canetti, R., Rabin, T.: Fast asynchronous Byzantine agreement with optimal resilience. In: Proc. 25th Symp. Theory of Computing. (1993) 42-51
-
(1993)
Proc. 25th Symp. Theory of Computing
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
9
-
-
84948956297
-
The rampart toolkit for building high-integrity services
-
of Lecture Notes in Computer Science
-
Reiter, M.K.: The Rampart toolkit for building high-integrity services. In: Theory and Practice in Distributed Systems. Volume 938 of Lecture Notes in Computer Science. (1995) 99-110
-
(1995)
Theory and Practice in Distributed Systems
, vol.938
, pp. 99-110
-
-
Reiter, M.K.1
-
11
-
-
0036930216
-
Quantifying the cost of providing intrusion tolerance in group communication systems
-
Ramasamy, H.V., Pandey, P., Lyons, J., Cukier, M., Sanders, W.H.: Quantifying the cost of providing intrusion tolerance in group communication systems. In: Proc. Intl. Conf. Dependable Systems and Networks. (2002) 229-238
-
(2002)
Proc. Intl. Conf. Dependable Systems and Networks
, pp. 229-238
-
-
Ramasamy, H.V.1
Pandey, P.2
Lyons, J.3
Cukier, M.4
Sanders, W.H.5
-
12
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols (extended abstract)
-
of Lecture Notes in Computer Science
-
Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols (extended abstract). In: Advances in Cryptology: CRYPTO 2001. Volume 2139 of Lecture Notes in Computer Science. (2001) 524-541
-
(2001)
Advances in Cryptology: CRYPTO 2001
, vol.2139
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
13
-
-
22344451864
-
Random oracles in constantinople: Practical asynchronous byzantine agreement using cryptography
-
Cachin, C., Kursawe, K., Shoup, V.: Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Journal of Cryptology 18(3) (2005)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.3
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
14
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
DOI 10.1145/571637.571640
-
Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems 20(4) (2002) 398-461 (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2) (1988) 281-308
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
20
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
of Lecture Notes in Computer Science
-
Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Advances in Cryptology: CRYPTO '87. Volume 293 of Lecture Notes in Computer Science. (1988) 120-127
-
(1988)
Advances in Cryptology: CRYPTO '87
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
21
-
-
84948954277
-
Practical threshold signatures
-
of Lecture Notes in Computer Science
-
Shoup, V.: Practical Threshold Signatures. In: Advances in Cryptology: EUROCRYPT 2000. Volume 1087 of Lecture Notes in Computer Science. (2000) 207-220
-
(2000)
Advances in Cryptology: EUROCRYPT 2000
, vol.1087
, pp. 207-220
-
-
Shoup, V.1
|