Back to Results
First PageMeta Content
Sybil attack / Consensus / Distributed computing / Distributed data storage / Node / Distributed algorithm / Peer-to-peer / Byzantine fault tolerance / Computing / File sharing networks / Reputation management


Yale University Department of Computer Science Exposing Computationally-Challenged Byzantine Impostors James Aspnes1
Add to Reading List

Document Date: 2014-10-14 12:49:20


Open Document

File Size: 141,33 KB

Share Result on Facebook

City

Berlin / /

Company

Distributed Systems / Peerto-Peer Systems / CRC Press / Distributed Security Systems / Robust Censorship-Resistant Publishing Systems / IEEE Journal / Microsoft / /

Country

Germany / /

/

Event

Product Issues / /

Facility

New York University / /

IndustryTerm

physical network / player-optimal protocols / consensus algorithms / agreement protocols / agreement algorithm / public key infrastructure / validation protocol / similar tools / correct solutions / file systems / trust management systems / collective computing power / integrity services / point-to-point message-passing network / puzzle solutions / cβ solutions / synchronous point-to-point network / hybrid algorithm / virtual network / puzzle solution / challenge-response protocol / overlay network / δ-differential consensus algorithms / /

Organization

New York University / International Association for Cryptologic Research / National Science Foundation / Byzantine Impostors James Aspnes∗ Collin Jackson† Arvind Krishnamurthy‡ Department of Computer Science Yale University Abstract Internet / MIT / Yale University / Yale University Department / Internet Society / Byzantine Impostors James Aspnes1 Collin Jackson2 Arvind Krishnamurthy3 Department / /

Person

Nicholas J. A. Harvey / Collin Jackson† Arvind Krishnamurthy / Rabin / Rakesh Agrawal / Ling Huang / John Dunagan / Alexandre Evfimievski / Sean C. Rhea / Adam Back / Scott A. Vanstone / Marc Waldman / Phillip Rogaway / Juan A. Garay / Michael Burrows / Ramakrishnan Srikant / Paul C. van Oorschot / Jeremy Stribling / Stefan Saroiu / Matthias Fitzi / Michael B. Jones / David Pointcheval / Alfred J. Menezes / Anthony D. Joseph / Mihir Bellare / James Aspnes∗ Collin Jackson / John R. Douceur / Michael K. Reiter / Ben Y. Zhao / John D. Kubiatowicz / Vivek Vishnumurthy / Gil Neiger / Moni Naor / Ted Wobber / Jacques Stern / Cynthia Dwork / /

/

Position

editor / king / /

Product

participants / nodes / /

PublishedMedium

Journal of Cryptology / Lecture Notes in Computer Science / /

SportsLeague

International Association / /

Technology

consensus algorithms / challenge-response protocol / δ-differential consensus algorithms / public key infrastructure / Democracy algorithm / Byzantine agreement algorithm / peer-to-peer / Computer Science Yale University Abstract Internet protocols / 3 Democracy The Democracy algorithm / private key / Monarchy algorithm / peer-to-peer system / Operating Systems / two algorithms / Cryptography / public key / hybrid algorithm / DNS / 4 Monarchy The Democracy algorithm / firewall / Monarchy algorithms / validation protocol / Network Address Translation / Byzantine agreement protocols / digital signature / /

URL

http /

SocialTag