Sciweavers

148 search results - page 26 / 30
» Self-stabilization of Byzantine Protocols
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 10 months ago
Applying Prolog to Develop Distributed Systems
Development of distributed systems is a difficult task. Declarative programming techniques hold a promising potential for effectively supporting programmer in this challenge. Whil...
Nuno P. Lopes, Juan A. Navarro, Andrey Rybalchenko...
ESORICS
2010
Springer
13 years 11 months ago
Optimistic Fair Exchange with Multiple Arbiters
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has something that Bob wants, and Bob has something that Alice wants. A fair exchang...
Alptekin Küpçü, Anna Lysyanskaya
EUROCRYPT
1999
Springer
14 years 2 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 10 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
SPAA
2010
ACM
14 years 2 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...