Hidden problems of asynchronous proactive recovery
暂无分享,去创建一个
[1] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[2] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[3] William H. Sanders,et al. Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).
[4] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[5] Fred B. Schneider,et al. CODEX: a robust and secure secret distribution system , 2004, IEEE Transactions on Dependable and Secure Computing.
[6] Paulo Veríssimo,et al. On the Resilience of Intrusion-Tolerant Distributed Systems , 2006 .
[7] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[8] Paulo Veríssimo,et al. Proactive resilience through architectural hybridization , 2006, SAC.
[9] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[10] Paulo Veríssimo,et al. How resilient are distributed f fault/intrusion-tolerant systems? , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[11] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[12] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.