메뉴 건너뛰기




Volumn , Issue , 2000, Pages

Proactive recovery in a Byzantine-fault-tolerant system

Author keywords

[No Author keywords available]

Indexed keywords

FAULT TOLERANT COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; RECOVERY; SYSTEMS ANALYSIS;

EID: 85013791146     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (95)

References (28)
  • 1
    • 0042917398 scopus 로고    scopus 로고
    • A new paradigm for collision-free hashing: Incrementality at reduced cost
    • M. Bellare and D. Micciancio. A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost. In Advances in Cryptology-EUROCRYPT, 1997.
    • (1997) Advances in Cryptology-EUROCRYPT
    • Bellare, M.1    Micciancio, D.2
  • 2
    • 0010020069 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • J. Black et al. UMAC: Fast and Secure Message Authentication. In Advances in Cryptology-CRYPTO, 1999.
    • (1999) Advances in Cryptology-CRYPTO
    • Black, J.1
  • 4
    • 0003785721 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute of Technology, Cambridge, MA In preparation
    • M. Castro. Practical Byzantine Faul Tolerance. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, 2000. In preparation.
    • (2000) Practical Byzantine Faul Tolerance
    • Castro, M.1
  • 8
    • 0031383381 scopus 로고
    • A reliable multicast framework for lightweight sessions and application level framing
    • S. Floyd et al. A Reliable Multicast Framework for Lightweight Sessions and Application Level Framing. IEEE/ACM Transactions on Networking, 5(6), 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.5 , Issue.6
    • Floyd, S.1
  • 10
    • 85029362278 scopus 로고    scopus 로고
    • Secure distributed storage and retrieval
    • to appear
    • J. Garay et al. Secure Distributed Storage and Retrieval. Theoretical Computer Science, to appear.
    • Theoretical Computer Science
    • Garay, J.1
  • 11
    • 0003370741 scopus 로고
    • ASecurity risk of depending on synchronized clocks
    • L. Gong. ASecurity Risk of Depending on Synchronized Clocks. Operating Systems Review, 26(1):49-53, 1992.
    • (1992) Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 13
    • 0000299804 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • A. Herzberg et al. Proactive Secret Sharing, Or: How To Cope With Perpetual Leakage. In Advances in Cryptology-CRYPTO, 1995.
    • (1995) Advances in Cryptology-CRYPTO
    • Herzberg, A.1
  • 15
    • 0023964787 scopus 로고
    • Scale and performance in a distributed file system
    • J. Howard et al. Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems, 6(1), 1988.
    • (1988) ACM Transactions on Computer Systems , vol.6 , Issue.1
    • Howard, J.1
  • 17
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7), 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7
    • Lamport, L.1
  • 23
    • 84885903862 scopus 로고
    • ViewstampedReplication: ANew primary copy method to support highly-available distributed systems
    • B. Oki and B. Liskov. ViewstampedReplication: ANew Primary Copy Method to Support Highly-Available Distributed Systems. In ACM Symposium on Principles of Distributed Computing, 1988.
    • (1988) ACM Symposium on Principles of Distributed Computing
    • Oki, B.1    Liskov, B.2
  • 25
    • 0002532551 scopus 로고
    • Why aren't operating systems getting faster as fast as hardware?
    • J. Ousterhout. Why Aren't Operating Systems Getting Faster as Fast as Hardware? In USENIX Summer, 1990.
    • (1990) USENIX Summer
    • Ousterhout, J.1
  • 27
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • R. Rivest. The MD5 Message-Digest Algorithm. Internet RFC-1321, 1992.
    • (1992) Internet RFC-1321
    • Rivest, R.1
  • 28
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. Schneider. Implementing Fault-Tolerant Services Using The State Machine Approach: A Tutorial. ACM Computing Surveys, 22(4), 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4
    • Schneider, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.