Back to Results
First PageMeta Content
Cryptography / Distributed computing / File sharing / Failure / Theory of computation / Peer-to-peer / Distributed hash table / Chord / Communications protocol / Distributed data storage / Computing / Concurrent computing


1 Towards Practical Communication in Byzantine-Resistant DHTs Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten
Add to Reading List

Document Date: 2012-04-29 17:42:21


Open Document

File Size: 321,22 KB

Share Result on Facebook

Company

Section IV-B / Fiat / IV-A / RCP-I / /

Country

Singapore / /

/

Event

Product Issues / FDA Phase / /

Facility

National University of Singapore / Max Planck Institute / University of Waterloo / /

IndustryTerm

search path / randomized communication protocol / software level / faulttolerant systems / agreement protocol / real-world applications / large-scale decentralized services / verifiable secret sharing protocol / signature generation protocol / multicast protocol / multi-hop networks / spurious communications / communication protocols / fault-tolerant services / share recovery protocols / /

OperatingSystem

DoS / /

Organization

Qj / National University of Singapore / Max Planck Institute for Software Systems / University of Waterloo / U.S. Securities and Exchange Commission / Q2 / D. Hence / Qi / David R. Cheriton School of Computer Science / School of Computing / /

Person

Ian Goldberg / Aniket Kate / Martin Karsten Abstract / Key Shares / /

Position

trusted dealer / RT / p RT / Using RT / dealer / Private / /

Product

PlanetLab / peer gives / nodes / peer / P2P / behaviour / peers / RCP1 / /

Technology

second protocol / randomized algorithm / DKG protocol / corresponding protocol / distribution algorithm / signature generation protocol / Distributed algorithms / peer-to-peer / Query/Update protocol / randomized communication protocol / P2P / The protocol / multicast protocol / private key / two protocols / secret key / Byzantine agreement protocol / quorum-based protocols / cryptography / verifiable secret sharing protocol / public key / share recovery protocols / The DKG protocol / file sharing / simulation / communication protocols / P2P system / /

SocialTag