<--- Back to Details
First PageDocument Content
Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2007-09-28 06:20:39
Consensus
Alice and Bob
Constructible universe
IP
Cryptography
Cryptographic protocols
Public-key cryptography

Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1 MIT CSAIL, {sethg,cnewport}@mit.edu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Download Document from Source Website

File Size: 231,11 KB

Share Document on Facebook

Similar Documents

arXiv:1810.05256v1 [cs.DC] 11 OctALEPH: A LEADERLESS, ASYNCHRONOUS, BYZANTINE FAULT TOLERANT CONSENSUS PROTOCOL ´ ADAM GA

arXiv:1810.05256v1 [cs.DC] 11 OctALEPH: A LEADERLESS, ASYNCHRONOUS, BYZANTINE FAULT TOLERANT CONSENSUS PROTOCOL ´ ADAM GA

DocID: 1xVeW - View Document

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias  Bryan Ford

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias Bryan Ford

DocID: 1xUwT - View Document

Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems By Tim Swanson Published: April 6,

Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems By Tim Swanson Published: April 6,

DocID: 1xU8G - View Document

Distributed Systems, Failures, and Consensus Jeff Chase Duke University  The Players

Distributed Systems, Failures, and Consensus Jeff Chase Duke University The Players

DocID: 1xTPl - View Document

VasiliosMavroudis   mavroud.is Research Interests Privacy Attacks & Countermeasures, AI Safety & Adversarial Machine Learning, Consensus Protocols & Market Microstructure

VasiliosMavroudis  mavroud.is Research Interests Privacy Attacks & Countermeasures, AI Safety & Adversarial Machine Learning, Consensus Protocols & Market Microstructure

DocID: 1xTK1 - View Document