Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography
暂无分享,去创建一个
[1] Michael K. Reiter,et al. A high-throughput secure reliable multicast protocol , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[2] Maurice Herlihy,et al. Axioms for concurrent objects , 1987, POPL '87.
[3] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[4] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[5] Michael K. Reiter,et al. Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.
[6] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[7] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[8] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Michael K. Reiter,et al. The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.
[11] Michael K. Reiter,et al. Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[12] Yoram Moses,et al. Fully polynomial Byzantine agreement in t + 1 rounds , 1993, STOC.
[13] Michael K. Reiter,et al. Unreliable intrusion detection in distributed computations , 1997, Proceedings 10th Computer Security Foundations Workshop.
[14] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[15] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[16] David K. Gifford,et al. Weighted voting for replicated data , 1979, SOSP '79.
[17] Calton Pu,et al. A Specialization Toolkit to Increase the Diversity of Operating Systems , 1996 .
[18] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[19] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[20] Flaviu Cristian,et al. Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement , 1995, Inf. Comput..
[21] Louise E. Moser,et al. The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[22] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[23] Miguel Castro,et al. A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm , 1999 .
[24] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[25] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[26] Barbara Liskov,et al. Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.
[27] Gene Tsudik. Message authentication with one-way hash functions , 1992, CCRV.