On diffusing updates in a Byzantine environment
暂无分享,去创建一个
[1] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[2] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[3] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[4] David K. Gifford,et al. Weighted voting for replicated data , 1979, SOSP '79.
[5] Roger M. Needham,et al. Grapevine: an exercise in distributed computing , 1982, CACM.
[6] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[7] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[8] Yogen K. Dalal,et al. The clearinghouse: a decentralized agent for locating named objects in a distributed environment , 1983, TOIS.
[9] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[10] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[11] B. Pittel. On spreading a rumor , 1987 .
[12] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[13] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[14] N. Fisher,et al. Probability Inequalities for Sums of Bounded Random Variables , 1994 .
[15] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[16] Kurt J. Lidl,et al. Drinking from the Firehose: Multicast USENET News , 1994, USENIX Winter.
[17] Michael K. Reiter,et al. Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.
[18] Umesh V. Vazirani,et al. An Introduction to Computational Learning Theory , 1994 .
[19] Louise E. Moser,et al. Total Ordering Algorithms for Asynchronous Byzantine Systems , 1995, WDAG.
[20] Flaviu Cristian,et al. Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement , 1995, Inf. Comput..
[21] Michael K. Reiter,et al. A high-throughput secure reliable multicast protocol , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[22] Michael K. Reiter,et al. Probabilistic quorum systems , 1997, PODC '97.
[23] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[24] Avishai Wool,et al. Probabilistic Byzantine quorum systems , 1998, PODC '98.
[25] Michael K. Reiter,et al. Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[26] Louise E. Moser,et al. The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[27] Mark Hayden,et al. Bimodal Multicast (revised) , 1999 .
[28] Kenneth P. Birman,et al. Bimodal multicast , 1999, TOCS.
[29] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.