Byzantine fault tolerance

Results: 131



#Item
71Ripple Labs Inc, 2014  The Ripple Protocol Consensus Algorithm David Schwartz [removed] Noah Youngs

Ripple Labs Inc, 2014 The Ripple Protocol Consensus Algorithm David Schwartz [removed] Noah Youngs

Add to Reading List

Source URL: ripple.com

Language: English - Date: 2015-04-09 15:31:57
72The Saddest Moment James Mickens James Mickens is a researcher in the Distributed Systems group at Microsoft’s Redmond

The Saddest Moment James Mickens James Mickens is a researcher in the Distributed Systems group at Microsoft’s Redmond

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-10-02 17:06:29
73fixInt.all.crumpling.data.0.eps

fixInt.all.crumpling.data.0.eps

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2008-07-23 04:39:02
74Enabling Blockchain Innovations with Pegged Sidechains Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille∗† commit 562

Enabling Blockchain Innovations with Pegged Sidechains Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille∗† commit 562

Add to Reading List

Source URL: www.blockstream.com

Language: English - Date: 2015-03-28 17:55:08
75BFT Protocols Under Fire Atul Singh†‡ Tathagata Das? Petros Maniatisφ Peter Druschel† Timothy Roscoeχ

BFT Protocols Under Fire Atul Singh†‡ Tathagata Das? Petros Maniatisφ Peter Druschel† Timothy Roscoeχ

Add to Reading List

Source URL: people.inf.ethz.ch

Language: English - Date: 2014-09-30 10:30:54
76SCALING BYZANTINE REPLICATION TO WIDE-AREA NETWORKS  by John W. Lane

SCALING BYZANTINE REPLICATION TO WIDE-AREA NETWORKS by John W. Lane

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:39
77INTRUSION-TOLERANT REPLICATION UNDER ATTACK  by Jonathan Kirsch

INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
78Chapter 7: Replication Management using the State Machine Approach Fred B. Schneider* Department of Computer Science

Chapter 7: Replication Management using the State Machine Approach Fred B. Schneider* Department of Computer Science

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-31 13:35:00
79Blueprint for a science of cybersecurity | Fred B. Schneider  1. Introduction

Blueprint for a science of cybersecurity | Fred B. Schneider 1. Introduction

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-04-26 11:36:06
80LNCS[removed]Beyond Traces and Independence

LNCS[removed]Beyond Traces and Independence

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:07:42