From O ( n 2 ) to O ( n ) : An Efficient Deterministic Algorithm for Byzantine Agreement
暂无分享,去创建一个
[1] Tracey Ho,et al. New results on network error correction: Capacities and upper bounds , 2010, 2010 Information Theory and Applications Workshop (ITA).
[2] Lang Tong,et al. Nonlinear network coding is necessary to combat general Byzantine attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] Christina Fragouli,et al. On Feedback for Network Coding , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[5] Matthias Fitzi,et al. Optimally efficient multi-valued byzantine agreement , 2006, PODC '06.
[6] Martin Hirt,et al. Efficient Multi-party Computation with Dispute Control , 2006, TCC.
[7] Kenneth P. Birman,et al. Reliable Distributed Systems: Technologies, Web Services, and Applications , 2005 .
[8] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[9] R. Koetter,et al. An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[10] Ueli Maurer,et al. Efficient Secure Multi-party Computation , 2000, ASIACRYPT.
[11] Joseph Y. Halpern,et al. The Failure Discovery problem , 1993, Mathematical systems theory.
[12] Joseph Y. Halpern,et al. Message-optimal protocols for Byzantine Agreement , 1993, Mathematical systems theory.
[13] Vassos Hadzilacos,et al. On the message complexity of binary byzantine agreement under crash failures , 1992, Distributed Computing.
[14] Brian A. Coan,et al. Modular Construction of a Byzantine Agreement Protocol with Optimal Message Bit Complexity , 1992, Inf. Comput..
[15] Piotr Berman,et al. Bit optimal distributed consensus , 1992 .
[16] Danny Dolev,et al. Multiparty communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[17] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[18] Eric C. Cooper. Replicated distributed programs , 1985, SOSP '85.
[19] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[20] J. T. Sims,et al. The Byzantine Generals Problem , 1982, TOPL.
[21] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[22] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[23] Kenneth P. Birman,et al. A History of the Virtual Synchrony Replication Model , 2010, Replication.
[24] T. Ho,et al. On Linear Network Coding , 2010 .
[25] Nitin H. Vaidya,et al. Secure Capacity of Wireless Broadcast Networks , 2009 .
[26] Birgit Pfitzmann,et al. Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .
[27] Yair Amir,et al. The Spread Wide Area Group Communication System , 2007 .
[28] R. Yeung,et al. NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .
[29] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[30] Danny Dolev,et al. Bounds on information exchange for Byzantine agreement , 1985, JACM.