<--- Back to Details
First PageDocument Content
Data synchronization / Computer storage / Theory of computation / Replication / Byzantine fault tolerance / Intrusion tolerance / State machine replication / Fault-tolerant system / Communications protocol / Computing / Fault-tolerant computer systems / Fault tolerance
Date: 2013-09-20 16:47:28
Data synchronization
Computer storage
Theory of computation
Replication
Byzantine fault tolerance
Intrusion tolerance
State machine replication
Fault-tolerant system
Communications protocol
Computing
Fault-tolerant computer systems
Fault tolerance

INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch

Add to Reading List

Source URL: www.dsn.jhu.edu

Download Document from Source Website

File Size: 1,22 MB

Share Document on Facebook

Similar Documents

THE SWIRLDS HASHGRAPH CONSENSUS ALGORITHM: FAIR, FAST, BYZANTINE FAULT TOLERANCE LEEMON BAIRD MAY 31, 2016 SWIRLDS TECH REPORT SWIRLDS-TR

DocID: 1veqU - View Document

Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, FebruaryPractical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Laboratory for Compu

DocID: 1uPp4 - View Document

Power Fault Tolerance Technical Report (WIP) Protocol Labs July 27, 2017 Abstract Byzantine Fault Tolerance (BFT) accounts for faults as the number of faulty nodes and is thus cumbersome to apply to many modern decentral

DocID: 1tHZO - View Document

Byzantine Fault Tolerance Raymond Cheng CSE452

DocID: 1sMnO - View Document

Practical Byzantine Fault Tolerance Castro and Liskov SOSP 99 Why this paper?

DocID: 1sGJD - View Document