-
1
-
-
84995401840
-
-
How a Visa transaction works. http://apps.usa.visa.com/merchants/become-a-merchant/how-a-visa-transaction-works.jsp, 2015.
-
(2015)
-
-
How a Visa transaction works1
-
2
-
-
33845427383
-
Fault-scalable byzantine fault-tolerant services
-
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. Fault-scalable byzantine fault-tolerant services. ACM SIGOPS Operating Systems Review, 39(5):59-74, 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.5
, pp. 59-74
-
-
Abd-El-Malek, M.1
Ganger, G.R.2
Goodson, G.R.3
Reiter, M.K.4
Wylie, J.J.5
-
3
-
-
84881234170
-
Charm: A framework for rapidly prototyping cryptosystems
-
J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan, M. Green, and A. D. Rubin. Charm: a framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering, 3(2):111-128, 2013.
-
(2013)
Journal of Cryptographic Engineering
, vol.3
, Issue.2
, pp. 111-128
-
-
Akinyele, J.A.1
Garman, C.2
Miers, I.3
Pagano, M.W.4
Rushanan, M.5
Green, M.6
Rubin, A.D.7
-
4
-
-
79957623137
-
Prime: Byzantine replication under attack
-
Y. Amir, B. Coan, J. Kirsch, and J. Lane. Prime: Byzantine replication under attack. Dependable and Secure Computing, IEEE Transactions on, 8(4):564-577, 2011.
-
(2011)
Dependable and Secure Computing, IEEE Transactions on
, vol.8
, Issue.4
, pp. 564-577
-
-
Amir, Y.1
Coan, B.2
Kirsch, J.3
Lane, J.4
-
5
-
-
76949086086
-
Steward: Scaling byzantine fault-tolerant replication to wide area networks
-
Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru, J. Olsen, and D. Zage. Steward: Scaling byzantine fault-tolerant replication to wide area networks. Dependable and Secure Computing, IEEE Transactions on, 7(1):80-93, 2010.
-
(2010)
Dependable and Secure Computing, IEEE Transactions on
, vol.7
, Issue.1
, pp. 80-93
-
-
Amir, Y.1
Danilov, C.2
Dolev, D.3
Kirsch, J.4
Lane, J.5
Nita-Rotaru, C.6
Olsen, J.7
Zage, D.8
-
6
-
-
84893255659
-
Rbft: Redundant byzantine fault tolerance
-
IEEE
-
P.-L. Aublin, S. Ben Mokhtar, and V. Quéma. Rbft: Redundant byzantine fault tolerance. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, pages 297-306. IEEE, 2013.
-
(2013)
Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on
, pp. 297-306
-
-
Aublin, P.-L.1
Ben Mokhtar, S.2
Quéma, V.3
-
7
-
-
0842310827
-
Simple and efficient threshold cryptosystem from the gap diffie-hellman group
-
IEEE
-
J. Baek and Y. Zheng. Simple and efficient threshold cryptosystem from the gap diffie-hellman group. In Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE, volume 3, pages 1491-1495. IEEE, 2003.
-
(2003)
Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE
, vol.3
, pp. 1491-1495
-
-
Baek, J.1
Zheng, Y.2
-
8
-
-
0346342609
-
Resilient-optimal interactive consistency in constant time
-
M. Ben-Or and R. El-Yaniv. Resilient-optimal interactive consistency in constant time. Distributed Computing, 16(4):249-262, 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.4
, pp. 249-262
-
-
Ben-Or, M.1
El-Yaniv, R.2
-
10
-
-
84912085288
-
State machine replication for the masses with bft-smart
-
IEEE
-
A. Bessani, J. Sousa, and E. E. Alchieri. State machine replication for the masses with bft-smart. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 355-362. IEEE, 2014.
-
(2014)
Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on
, pp. 355-362
-
-
Bessani, A.1
Sousa, J.2
Alchieri, E.E.3
-
11
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
-
Springer
-
A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In Public key cryptographyâA TPKC 2003, pages 31-46. Springer, 2002.
-
(2002)
Public Key CryptographyâA TPKC 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
12
-
-
84954113477
-
Research perspectives on bitcoin and second-generation digital currencies
-
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. Kroll, and E. W. Felten. Research perspectives on bitcoin and second-generation digital currencies. In 2015 IEEE Symposium on Security and Privacy. IEEE, 2015.
-
(2015)
2015 IEEE Symposium on Security and Privacy. IEEE
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.5
Felten, E.W.6
-
13
-
-
0023451681
-
Asynchronous byzantine agreement protocols
-
G. Bracha. Asynchronous byzantine agreement protocols. Information and Computation, 75(2):130-143, 1987.
-
(1987)
Information and Computation
, vol.75
, Issue.2
, pp. 130-143
-
-
Bracha, G.1
-
15
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols
-
Springer
-
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and efficient asynchronous broadcast protocols. In Advances in Cryptology - Crypto 2001, pages 524-541. Springer, 2001.
-
(2001)
Advances in Cryptology - Crypto 2001
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
20
-
-
70350244177
-
Practical byzantine fault tolerance
-
M. Castro, B. Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173-186, 1999.
-
(1999)
OSDI
, vol.99
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
21
-
-
72249084310
-
Upright cluster services
-
ACM
-
A. Clement, M. Kapritsos, S. Lee, Y. Wang, L. Alvisi, M. Dahlin, and T. Riche. Upright cluster services. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pages 277-290. ACM, 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
, pp. 277-290
-
-
Clement, A.1
Kapritsos, M.2
Lee, S.3
Wang, Y.4
Alvisi, L.5
Dahlin, M.6
Riche, T.7
-
22
-
-
85026654819
-
Making byzantine fault tolerant systems tolerate byzantine faults
-
A. Clement, E. L. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. Making byzantine fault tolerant systems tolerate byzantine faults. In NSDI, volume 9, pages 153-168, 2009.
-
(2009)
NSDI
, vol.9
, pp. 153-168
-
-
Clement, A.1
Wong, E.L.2
Alvisi, L.3
Dahlin, M.4
Marchetti, M.5
-
24
-
-
84995472627
-
On scaling decentralized blockchains - A position paper
-
K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. W. and. On scaling decentralized blockchains - a position paper. 3rd Bitcoin Research Workshop, 2015.
-
(2015)
3rd Bitcoin Research Workshop
-
-
Croman, K.1
Decker, C.2
Eyal, I.3
Gencer, A.E.4
Juels, A.5
Kosba, A.6
Miller, A.7
Saxena, P.8
Shi, E.9
Sirer, E.G.10
Song, D.11
-
26
-
-
0023994903
-
Consensus in the presence of partial synchrony
-
C. Dwork, N. Lynch, and L. Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM (JACM), 35(2):288-323, 1988.
-
(1988)
Journal of the ACM (JACM)
, vol.35
, Issue.2
, pp. 288-323
-
-
Dwork, C.1
Lynch, N.2
Stockmeyer, L.3
-
27
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM), 32(2):374-382, 1985.
-
(1985)
Journal of the ACM (JACM)
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
31
-
-
79960819698
-
2) bit barrier: Scalable byzantine agreement with an adaptive adversary
-
2) bit barrier: scalable byzantine agreement with an adaptive adversary. Journal of the ACM (JACM), 58(4):18, 2011.
-
(2011)
Journal of the ACM (JACM)
, vol.58
, Issue.4
, pp. 18
-
-
King, V.1
Saia, J.2
-
32
-
-
84995499199
-
-
arXiv preprint arXiv:1602.06997
-
E. Kokoris-Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. arXiv preprint arXiv:1602.06997, 2016.
-
(2016)
Enhancing Bitcoin Security and Performance with Strong Consistency Via Collective Signing
-
-
Kokoris-Kogias, E.1
Jovanovic, P.2
Gailly, N.3
Khoffi, I.4
Gasser, L.5
Ford, B.6
-
33
-
-
41149091269
-
Zyzzyva: Speculative byzantine fault tolerance
-
ACM
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: speculative byzantine fault tolerance. In ACM SIGOPS Operating Systems Review, volume 41, pages 45-58. ACM, 2007.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, pp. 45-58
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
34
-
-
84995478727
-
Optimistic asynchronous atomic broadcast
-
L Caires, GF Italiano, L. Monteiro, Eds. LNCS 3580, Citeseer
-
K. Kursawe and V. Shoup. Optimistic asynchronous atomic broadcast. In in the Proceedings of International Colloqium on Automata, Languages and Programming (ICALP05) (L Caires, GF Italiano, L. Monteiro, Eds.) LNCS 3580. Citeseer, 2001.
-
(2001)
The Proceedings of International Colloqium on Automata, Languages and Programming (ICALP05)
-
-
Kursawe, K.1
Shoup, V.2
-
37
-
-
84966644341
-
Scp: A computationally-scalable byzantine consensus protocol for blockchains
-
2015
-
L. Luu, V. Narayanan, K. Baweja, C. Zheng, S. Gilbert, and P. Saxena. Scp: A computationally-scalable byzantine consensus protocol for blockchains. Cryptology ePrint Archive, Report 2015/1168, 2015. http://eprint.iacr.org/.
-
Cryptology EPrint Archive, Report 2015/1168
-
-
Luu, L.1
Narayanan, V.2
Baweja, K.3
Zheng, C.4
Gilbert, S.5
Saxena, P.6
-
39
-
-
85076877328
-
Mencius: Building efficient replicated state machines for wans
-
Y. Mao, F. P. Junqueira, and K. Marzullo. Mencius: building efficient replicated state machines for wans. In OSDI, volume 8, pages 369-384, 2008.
-
(2008)
OSDI
, vol.8
, pp. 369-384
-
-
Mao, Y.1
Junqueira, F.P.2
Marzullo, K.3
-
41
-
-
84995456460
-
How bitcoin became the honey badger of money
-
R. McMillan. How bitcoin became the honey badger of money. Wired Magazine, http://www.wired.com/2013/12/bitcoin-honey/, 2013.
-
(2013)
Wired Magazine
-
-
McMillan, R.1
-
42
-
-
84966585262
-
-
Online full version
-
A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song. The honey badger of bft protocols. [Online full version] http://eprint.iacr.org/2016/199, 2016.
-
(2016)
The Honey Badger of Bft Protocols
-
-
Miller, A.1
Xia, Y.2
Croman, K.3
Shi, E.4
Song, D.5
-
47
-
-
36849043267
-
Parsimonious asynchronous byzantine-fault-tolerant atomic broadcast
-
Springer
-
H. V. Ramasamy and C. Cachin. Parsimonious asynchronous byzantine-fault-tolerant atomic broadcast. In OPODIS, pages 88-102. Springer, 2005.
-
(2005)
OPODIS
, pp. 88-102
-
-
Ramasamy, H.V.1
Cachin, C.2
-
49
-
-
85094633379
-
Bft protocols under fire
-
Berkeley, CA, USA, USENIX Association
-
A. Singh, T. Das, P. Maniatis, P. Druschel, and T. Roscoe. Bft protocols under fire. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pages 189-204, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08
, pp. 189-204
-
-
Singh, A.1
Das, T.2
Maniatis, P.3
Druschel, P.4
Roscoe, T.5
-
50
-
-
74949103878
-
Spin one's wheels? Byzantine fault tolerance with a spinning primary
-
IEEE
-
G. S. Veronese, M. Correia, A. N. Bessani, and L. C. Lung. Spin one's wheels? byzantine fault tolerance with a spinning primary. In Reliable Distributed Systems, 2009. SRDS'09. 28th IEEE International Symposium on, pages 135-144. IEEE, 2009.
-
(2009)
Reliable Distributed Systems, 2009. SRDS'09. 28th IEEE International Symposium on
, pp. 135-144
-
-
Veronese, G.S.1
Correia, M.2
Bessani, A.N.3
Lung, L.C.4
-
51
-
-
79951903126
-
Ebawa: Efficient byzantine agreement for wide-area networks
-
IEEE
-
G. S. Veronese, M. Correia, A. N. Bessani, and L. C. Lung. Ebawa: Efficient byzantine agreement for wide-area networks. In High-Assurance Systems Engineering (HASE), 2010 IEEE 12th International Symposium on, pages 10-19. IEEE, 2010.
-
(2010)
High-assurance Systems Engineering (HASE), 2010 IEEE 12th International Symposium on
, pp. 10-19
-
-
Veronese, G.S.1
Correia, M.2
Bessani, A.N.3
Lung, L.C.4
|