Sciweavers

27 search results - page 1 / 6
» Niobe: A practical replication protocol
Sort
View
TOS
2008
83views more  TOS 2008»
13 years 7 months ago
Niobe: A practical replication protocol
John MacCormick, Chandramohan A. Thekkath, Marcus ...
DSN
2008
IEEE
14 years 1 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
ICPADS
2007
IEEE
14 years 1 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
CCS
2011
ACM
12 years 7 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
VLDB
2005
ACM
97views Database» more  VLDB 2005»
14 years 26 days ago
Fine-Grained Replication and Scheduling with Freshness and Correctness Guarantees
Lazy replication protocols provide good scalability properties by decoupling transaction execution from the propagation of new values to replica sites while guaranteeing a correct...
Fuat Akal, Can Türker, Hans-Jörg Schek, ...