<--- Back to Details
First PageDocument Content
Data / Data synchronization / Cryptographic protocols / Theory of computation / Replication / Verifiable secret sharing / Byzantine fault tolerance / Fault-tolerant system / Secret sharing / Computing / Fault-tolerant computer systems / Cryptography
Date: 2013-09-09 22:37:04
Data
Data synchronization
Cryptographic protocols
Theory of computation
Replication
Verifiable secret sharing
Byzantine fault tolerance
Fault-tolerant system
Secret sharing
Computing
Fault-tolerant computer systems
Cryptography

Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t

Add to Reading List

Source URL: www.cs.cornell.edu

Download Document from Source Website

File Size: 421,51 KB

Share Document on Facebook

Similar Documents

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

DocID: 1xVqL - View Document

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

DocID: 1xUKn - View Document

Cluster Fault-Tolerance: An Experimental Evaluation of Checkpointing and MapReduce through Simulation Thomas C. Bressoud #1 , Michael A. Kozuch ∗2 #

Cluster Fault-Tolerance: An Experimental Evaluation of Checkpointing and MapReduce through Simulation Thomas C. Bressoud #1 , Michael A. Kozuch ∗2 #

DocID: 1rqZy - View Document

Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun† Petros Maniatis⋆ Scott Shenker†‡ †

Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun† Petros Maniatis⋆ Scott Shenker†‡ †

DocID: 1rqQM - View Document