Sciweavers

219 search results - page 13 / 44
» Byzantine Quorum Systems
Sort
View
JSAC
2010
113views more  JSAC 2010»
13 years 8 months ago
On counteracting Byzantine attacks in network coded peer-to-peer networks
Abstract—Random linear network coding can be used in peerto-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are ...
MinJi Kim, Luísa Lima, Fang Zhao, Joã...
WDAG
2007
Springer
100views Algorithms» more  WDAG 2007»
14 years 4 months ago
Bounded Wait-Free Implementation of Optimally Resilient Byzantine Storage Without (Unproven) Cryptographic Assumptions
We present the first optimally resilient, bounded, wait-free implementation of a distributed atomic register, tolerating Byzantine readers and (up to one-third of) Byzantine serve...
Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi
LADC
2011
Springer
13 years 22 days ago
Byzantine Fault-Tolerant Deferred Update Replication
Abstract—Replication is a well-established approach to increasing database availability. Many database replication protocols have been proposed for the crash-stop failure model, ...
Fernando Pedone, Nicolas Schiper, José Enri...
EUROCRYPT
1998
Springer
14 years 2 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
JISE
2000
56views more  JISE 2000»
13 years 9 months ago
Quorum-Based Replication in Object-Based Systems
methods. If a pair of methods op1 and op2 are compatible, the summation of the quorum numbers of op1 and op2 can be smaller than the number of replicas in the QOL protocol even if ...
Katsuya Tanaka, Kyoji Hasegawa, Makoto Takizawa