Sciweavers

34 search results - page 3 / 7
» Byzantine replication under attack
Sort
View
SOSP
2005
ACM
14 years 4 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...
ICALP
2004
Springer
14 years 27 days ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
DAGSTUHL
1994
13 years 8 months ago
The Rampart Toolkit for Building High-Integrity Services
Abstract. Rampart is a toolkit of protocols to facilitate the development of high-integrity services, i.e., distributed services that retain their availability and correctness desp...
Michael K. Reiter
PODC
2012
ACM
11 years 10 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
ETRICS
2006
13 years 11 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...