Back to Results
First PageMeta Content
Cryptography / Virtual synchrony / Consensus / State machine replication / Public-key cryptography / Verifiable secret sharing / Communications protocol / Internet Relay Chat / Computing / Fault-tolerant computer systems / Data


Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.
Add to Reading List

Document Date: 2013-09-18 16:37:35


Open Document

File Size: 182,71 KB

Share Result on Facebook

City

Piscataway / Austin / Boston / Baltimore / Portland / San Diego / /

Company

Distributed Systems / Distributed Computing Systems / Distribution Unlimited / Assurable Mobile Ad-Hoc Networks / DARPA’s Intrinsically Assurable Mobile Ad-Hoc Networks / International Journal / Rekey / Section V. RELATED WORK Group / Intel / /

Country

United States / /

/

Event

Product Issues / Reorganization / FDA Phase / /

Facility

Unlike Rampart / Brian Coan2 Johns Hopkins University / OpenSSL library / Naval Warfare Systems Center / Rampart Toolkit / /

IndustryTerm

threshold key generation protocol / fault tolerant group key management / security infrastructure / faulttolerant agreement protocol / controller coordination protocol / fault-tolerant agreement protocol / communication systems / membership management / secure group communication systems / trusted hardware / tamper-proof hardware / client protocol / mobile adhoc networks / agreement protocol / integrity services / mobile ad-hoc networks / intrusion-tolerant group management protocol / limited tamper-proof hardware / security services / logical / coordination protocol / asynchronous communication network / computing / fault-tolerant state machine replication protocols / security protocols / contributory key agreement protocol / generic infrastructure / /

OperatingSystem

ISIS / /

Organization

Defense Advanced Research Projects Agency / Johns Hopkins University / Space and Naval Warfare Systems Center / /

Person

Fig / B. Dutertre / V / /

Position

correct controller / corresponding controller / trusted dealer / Request validation Each group controller / Byzantine model / faulty processes can fail arbitrarily / group controller / ejected controller / first correct controller / generation and dissemination Each group controller / dealer / Private / each correct group controller / controller / /

Product

OpenTC / Public Release / process makes / nodes / clients / process / processes / Dutertre / Our solution / controllers / group members / client / /

ProgrammingLanguage

Hoc / /

ProvinceOrState

Texas / Maryland / Oregon / Massachusetts / /

Technology

Intrusion-Tolerant Enclaves protocol / Byzantine faulttolerant agreement protocol / agreement protocol / peer-to-peer / threshold key generation protocol / PICO protocol / voting protocol / security protocols / private key / two protocols / IntrusionTolerant Enclaves protocol / Operating Systems / SMR protocols / management protocol / weakly consistent Byzantine fault-tolerant agreement protocol / overall PICO protocol / PERFORMANCE CONSIDERATIONS The PICO protocol / encryption / 3 V. Protocol / contributory key agreement protocol / cryptography / public key / Byzantine fault-tolerant state machine replication protocols / controller coordination protocol / underlying routing protocol / Byzantine fault-tolerant agreement protocol / Client Protocol / digital signature / coordination protocol / non-bypassable encryption / MD. jak@cs.jhu.edu Telcordia Technologies / /

URL

http /

SocialTag