First Page | Document Content | |
---|---|---|
Date: 2013-09-20 16:47:28Data synchronization Computer storage Theory of computation Replication Byzantine fault tolerance Intrusion tolerance State machine replication Fault-tolerant system Communications protocol Computing Fault-tolerant computer systems Fault tolerance | INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan KirschAdd to Reading ListSource URL: www.dsn.jhu.eduDownload Document from Source WebsiteFile Size: 1,22 MBShare Document on Facebook |