메뉴 건너뛰기




Volumn 1693, Issue , 1999, Pages 123-139

Byzantine agreement secure against general adversaries in the dual failure model

Author keywords

Active adversary; Broadcast; Byzantine agreement; Fail corruption; Unconditional security

Indexed keywords

BROADCASTING; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84947940400     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48169-9_9     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 2
    • 0024770143 scopus 로고    scopus 로고
    • Towards optimal distributed consensus (Extended abstract)
    • Research Triangle Park, North Carolina, 30 Oct.-1 Nov. 1989. IEEE. 125
    • P. Berman, J. A. Garay, and K. J. Perry. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, pp. 410-415, Research Triangle Park, North Carolina, 30 Oct.-1 Nov. 1989. IEEE. 125
    • 30Th Annual Symposium on Foundations of Computer Science , pp. 410-415
    • Berman, P.1    Garay, J.A.2    Perry, K.J.3
  • 3
    • 0026839969 scopus 로고
    • Modular construction of a Byzantine agreement protocol with optimal message bit complexity
    • Mar, 125
    • B. A. Coan and J. L. Welch. Modular construction of a Byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1):61-85, Mar. 1992. 125
    • (1992) Information and Computation , vol.97 , Issue.1 , pp. 61-85
    • Coan, B.A.1    Welch, J.L.2
  • 4
    • 0020097405 scopus 로고
    • An efficient algorithm for Byzantine agreement without authentication
    • Mar, 125
    • D. Dolev, M. J. Fischer, R. Fowler, N. A. Lynch, and H. R. Strong. An efficient algorithm for Byzantine agreement without authentication. Information and Control, 52(3):257-274, Mar. 1982. 125
    • (1982) Information and Control , vol.52 , Issue.3 , pp. 257-274
    • Dolev, D.1    Fischer, M.J.2    Fowler, R.3    Lynch, N.A.4    Strong, H.R.5
  • 6
    • 84947907604 scopus 로고    scopus 로고
    • Efficient Byzantine agreement secure against general adversaries
    • 125, 125, 125, 132, 132, 137, 137, 138
    • M. Fitzi and U. Maurer. Efficient Byzantine agreement secure against general adversaries. In Distributed Computing — DISC, volume 1499, pp. 134-148, 1998. 125, 125, 125, 132, 132, 137, 137, 138
    • (1998) Distributed Computing — DISC , vol.1499 , pp. 134-148
    • Fitzi, M.1    Maurer, U.2
  • 8
    • 21144464689 scopus 로고    scopus 로고
    • A continuum of failure models for distributed computing
    • A. Segall and S. Zaks, editors, volume 647 of Lecture Notes in Computer Science, Haifa, Israel, 2-4 Nov. 1992. Springer. 125, 125, 125, 126, 127, 132, 132, 132, 137, 137
    • J. A. Garay and K. J. Perry. A continuum of failure models for distributed computing. In A. Segall and S. Zaks, editors, Distributed Algorithms, 6th International Workshop, WDAG ’92, volume 647 of Lecture Notes in Computer Science, pp. 153-165, Haifa, Israel, 2-4 Nov. 1992. Springer. 125, 125, 125, 126, 127, 132, 132, 132, 137, 137
    • Distributed Algorithms, 6Th International Workshop, WDAG ’92 , pp. 153-165
    • Garay, J.A.1    Perry, K.J.2
  • 12
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • Apr, 125, 127
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, Apr. 1980. 125, 127
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.