-
1
-
-
70350653341
-
-
ABCGM unpublished manuscript, MIT
-
[ABCGM] B. Awerbuch, M. Blum, B. Chor, S. Goldwasser, and S. Micali, "How to Implement Bracha's 0(log n) Byzantine Agreement Algorithm", unpublished manuscript, MIT.
-
How to Implement Bracha's 0(log N) Byzantine Agreement Algorithm
-
-
Awerbuch, B.1
Blum, M.2
Chor, B.3
Goldwasser, S.4
Micali, S.5
-
2
-
-
85049234498
-
Rsa/rabin bits are + poiy{\osn) secure
-
ACGS
-
[ACGS] W. Alcxi, B. Chor, O. Goldreich, and C.P. Schnorr, "RSA/Rabin Bits Are + poiy{\OSN) Secure"> Proc- 25lh Annual Symposium on Foundations of Computer Science (1984), pp. 449-457.
-
(1984)
Proc- 25lh Annual Symposium on Foundations of Computer Science
, pp. 449-457
-
-
Alcxi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
3
-
-
0020976844
-
Another advantage of free choice: Completely asynchronous agreement protocols
-
Be Computing
-
[Be] M. Ben-Or, "Another Advantage of Free Choice: Completely Asynchronous Agreement Protocols", Proc. 2nd Annual ACM Symposium on Principles of Distributed, Computing (1983), pp. 27-30.
-
(1983)
Proc. 2nd Annual ACM Symposium on Principles of Distributed
, pp. 27-30
-
-
Ben-Or, M.1
-
4
-
-
0021900599
-
An (lg n) expected rounds randomized byzantine generals algorithm
-
Br
-
[Br] G. Bracha, "An (lg n) Expected Rounds Randomized Byzantine Generals Algorithm", Proc. 17th Annual ACM Symposium on Theory of Computing (1985), pp. 316-326.
-
(1985)
Proc. 17th Annual ACM Symposium on Theory of Computing
, pp. 316-326
-
-
Bracha, G.1
-
6
-
-
0021549809
-
A simple and efficient randomized byzantine agreement algorithm
-
CC To appear in IEEE Transactions on Software Engineering
-
[CC] B. Chor and B. Coan, "A Simple and Efficient Randomized Byzantine Agreement Algorithm", Proc. 4th Symposium on Reliability m Distributed Software and Database Systems (1984), pp. 98-106. To appear in IEEE Transactions on Software Engineering.
-
(1984)
Proc. 4th Symposium on Reliability M Distributed Software and Database Systems
, pp. 98-106
-
-
Chor, B.1
Coan, B.2
-
9
-
-
0021409284
-
Probabilistic encryption
-
GM
-
[GM] S. Goldwasser and S. Micali, "Probabilistic Encryption", Jour, of Computer and System Sciences, 28(2) (1984), pp. 270-299.
-
(1984)
Jour, of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
84976699318
-
The byzantine generals problem
-
LSP
-
[LSP] L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", ACM Transactions on Programming Languages and Systems 4(3) (1982), pp. 382-401.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
13
-
-
84976810569
-
Reaching agreement in the presence of faults
-
PSL
-
[PSL] M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults" JACM 27(2) (1980) pp. 228-234.
-
(1980)
JACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
16
-
-
33845226507
-
Vulnerability of network control protocols: An example
-
Ro
-
[Ro] E. C. Rosen, "Vulnerability of Network Control Protocols: An Example" ACM SIGSOFT Software Engineering Notes, 6(1) (1981), pp. 6-8.
-
(1981)
ACM SIGSOFT Software Engineering Notes
, vol.6
, Issue.1
, pp. 6-8
-
-
Rosen, E.C.1
-
17
-
-
0021372186
-
Extending binary byzantine agreement to multi valued byzantine agreement
-
TC
-
[TC] R. Turpin and B. Coan, "Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement, Information Processing Letters 18(2) (1984), pp. 73-76.
-
(1984)
Information Processing Letters
, vol.18
, Issue.2
, pp. 73-76
-
-
Turpin, R.1
Coan, B.2
-
19
-
-
85049241484
-
-
[Y2], private communication
-
[Y2] A.C. Yao, private communication.
-
-
-
Yao, A.C.1
|