Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Synchronizing clocks in the presence of faults
Journal of the ACM (JACM)
Using Time Instead of Timeout for Fault-Tolerant Distributed Systems.
ACM Transactions on Programming Languages and Systems (TOPLAS)
How to assign votes in a distributed system
Journal of the ACM (JACM)
Applications of Byzantine agreement in database systems
ACM Transactions on Database Systems (TODS)
(N, K) Concept Fault Tolerance
IEEE Transactions on Computers - The MIT Press scientific computation series
Reaching approximate agreement in the presence of faults
Journal of the ACM (JACM)
On the minimal synchronism needed for distributed consensus
Journal of the ACM (JACM)
A communication-efficient canonical form for fault-tolerant distributed protocols
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
Asymptotically optimal algorithms for approximate agreement
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
What processes know: Definitions and proof methods
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
Byzantine clock synchronization
ACM SIGOPS Operating Systems Review
A message-based fault diagnosis procedure
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
An O(lg n) expected rounds randomized Byzantine generals protocol
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
The distributed firing squad problem
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
The consistent comparison problem in N-version software
ACM SIGSOFT Software Engineering Notes
A distributed repository for immutable persistent objects
OOPLSA '86 Conference proceedings on Object-oriented programming systems, languages and applications
On the reliability of consensus-based fault-tolerant distributed computing systems
ACM Transactions on Computer Systems (TOCS)
The Reliability of Voting Mechanisms
IEEE Transactions on Computers
Substituting for real time and common knowledge in asynchronous distributed systems
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Fault tolerant distributed process-control systems
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
An O(log n) expected rounds randomized byzantine generals protocol
Journal of the ACM (JACM)
Consensus in the presence of partial synchrony
Journal of the ACM (JACM)
Social choice theory and distributed decision making
COCS '88 Proceedings of the ACM SIGOIS and IEEECS TC-OA 1988 conference on Office information systems
The MAFT Architecture for Distributed Fault Tolerance
IEEE Transactions on Computers - Fault-Tolerant Computing
A Class of Inherently Fault Tolerant Distributed Programs
IEEE Transactions on Software Engineering
Reliable Broadcast in Hypercube Multicomputers
IEEE Transactions on Computers
Reliable scheduling in a TMR database system
ACM Transactions on Computer Systems (TOCS)
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
Automatically increasing the fault-tolerance of distributed systems
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
Dynamic Testing Strategy for Distributed Systems
IEEE Transactions on Computers
Simple constant-time consensus protocols in realistic failure models
Journal of the ACM (JACM)
A Heuristically-Aided Algorithm for Mutual Exclusion in Distributed Systems
IEEE Transactions on Computers
A hundred impossibility proofs for distributed computing
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
Modular construction of nearly optimal Byzantine agreement protocols
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
On the improbability of reaching Byzantine agreements
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
PODS '89 Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Constructing replicated systems using processors with point-to-point communication links
ISCA '89 Proceedings of the 16th annual international symposium on Computer architecture
AMp: a highly parallel atomic multicast protocol
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
The Consistent Comparison Problem in N-Version Software
IEEE Transactions on Software Engineering
Hardware-Assisted Software Clock Synchronization for Homogeneous Distributed Systems
IEEE Transactions on Computers
Early-delivery atomic broadcast
PODC '90 Proceedings of the ninth annual ACM symposium on Principles of distributed computing
Early stopping in Byzantine agreement
Journal of the ACM (JACM)
Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
An optimal fault-tolerant broadcasting algorithm for a hypercube multiprocessor
CSC '90 Proceedings of the 1990 ACM annual conference on Cooperation
Paradigms for process interaction in distributed programs
ACM Computing Surveys (CSUR)
A Design Approach for Ultrareliable Real-Time Systems
Computer - Special issue on real-time systems
Bounds on the time to reach agreement in the presence of timing uncertainty
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Consensus in the presence of timing uncertainty: omission and Byzantine failures (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Inconsistency and contamination (preliminary version)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Message-optimal protocols for byzantine agreement (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
IEEE Transactions on Computers
CRYPTO '89 Proceedings on Advances in cryptology
Reliable broadcast algorithms for HARTS
ACM Transactions on Computer Systems (TOCS)
ACM SIGOPS Operating Systems Review
Tolerating linear number of faults in networks of bounded degree
PODC '92 Proceedings of the eleventh annual ACM symposium on Principles of distributed computing
A tradeoff between safety and liveness for randomized coordinated attack protocols
PODC '92 Proceedings of the eleventh annual ACM symposium on Principles of distributed computing
An annotated bibliography of dependable distributed computing
ACM SIGOPS Operating Systems Review
Principal Features of the VOLTAN Family of Reliable Node Architectures for Distributed Systems
IEEE Transactions on Computers - Special issue on fault-tolerant computing
Simulating synchronized clocks and common knowledge in distributed systems
Journal of the ACM (JACM)
Open commit protocols tolerating commission failures
ACM Transactions on Database Systems (TODS)
The consensus problem in fault-tolerant computing
ACM Computing Surveys (CSUR)
Unifying self-stabilization and fault-tolerance
PODC '93 Proceedings of the twelfth annual ACM symposium on Principles of distributed computing
Fully polynomial Byzantine agreement in t + 1 rounds
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
The Information Bus: an architecture for extensible distributed systems
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Bounds on the time to reach agreement in the presence of timing uncertainty
Journal of the ACM (JACM)
On randomization in sequential and distributed algorithms
ACM Computing Surveys (CSUR)
Are wait-free algorithms fast?
Journal of the ACM (JACM)
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A formally verified algorithm for clock synchronization under a hybrid fault model
PODC '94 Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing
Degradable Byzantine Agreement
IEEE Transactions on Computers
Byzantine Agreement in a Generalized Connected Network
IEEE Transactions on Parallel and Distributed Systems
Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS
IEEE Transactions on Software Engineering
Bounds on information exchange for Byzantine agreement
Journal of the ACM (JACM)
Impossibility of distributed consensus with one faulty process
Journal of the ACM (JACM)
Asynchronous consensus and broadcast protocols
Journal of the ACM (JACM)
Distributed process groups in the V Kernel
ACM Transactions on Computer Systems (TOCS)
Secure hypergraphs: privacy from partial broadcast
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Unreliable failure detectors for reliable distributed systems
Journal of the ACM (JACM)
A Note on Consensus on Dual Failure Modes
IEEE Transactions on Parallel and Distributed Systems
Distributing trust with the Rampart toolkit
Communications of the ACM
New Hybrid Fault Models for Asynchronous Approximate Agreement
IEEE Transactions on Computers
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Maximizing Mean-Time to Failure in k-Resilient Systems with Repair
IEEE Transactions on Computers
Possible and Impossible Self-Stabilizing Digital ClockSynchronization in General Graphs
Real-Time Systems - Special issue on global time in large scale distributed real-time systems, part I
Comparing Verification Systems: Interactive Consistency in ACL2
IEEE Transactions on Software Engineering
Distributed software engineering
ICSE '94 Proceedings of the 16th international conference on Software engineering
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Maintaining authenticated communication in the presence of break-ins
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Dealing with server corruption in weakly consistent, replicated data systems
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
All-to-All Broadcasting in Faulty Hypercubes
IEEE Transactions on Computers
Distributed algorithms in Java
Proceedings of the 2nd conference on Integrating technology into computer science education
Formally Verified On-Line Diagnosis
IEEE Transactions on Software Engineering
Byzantine Agreement in the Presence of Mixed Faults on Processors and Links
IEEE Transactions on Parallel and Distributed Systems
Fault-tolerant wait-free shared objects
Journal of the ACM (JACM)
Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance
IEEE Transactions on Software Engineering
Multi-μ: an Ada 95 based architecture for fault tolerance support of real-time systems
Proceedings of the 1998 annual ACM SIGAda international conference on Ada
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Algorithmic mechanism design (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
On k-set consensus problems in asynchronous systems
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
A new model for availability in the face of self-propagating attacks
Proceedings of the 1998 workshop on New security paradigms
Fundamentals of fault-tolerant distributed computing in asynchronous environments
ACM Computing Surveys (CSUR)
Specification and verification of fault-tolerance, timing, and scheduling
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Journal of the ACM (JACM)
The Weak Byzantine Generals Problem
Journal of the ACM (JACM)
Easy impossibility proofs for distributed consensus problems
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Fast distributed agreement (preliminary version)
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Simple constant-time consensus protocols in realistic failure models (extended abstract)
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Inexact agreement: accuracy, precision, and graceful degradation
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Formal specification of N-modular redundancy
CSC '86 Proceedings of the 1986 ACM fourteenth annual conference on Computer science
Systematic Formal Verification for Fault-Tolerant Time-Triggered Algorithms
IEEE Transactions on Software Engineering
CSC '91 Proceedings of the 19th annual conference on Computer Science
Replica Determinism and Flexible Scheduling in Hard Real-Time Dependable Systems
IEEE Transactions on Computers
The Journal of Supercomputing
Stability of long-lived consensus (extended abstract)
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
Agreement and coalition formation in multiagent-based virtual marketplaces
IEA/AIE '00 Proceedings of the 13th international conference on Industrial and engineering applications of artificial intelligence and expert systems: Intelligent problem solving: methodologies and approaches
Exploiting Omissive Faults in Synchronous Approximate Agreement
IEEE Transactions on Computers
Tight bounds for k-set agreement
Journal of the ACM (JACM)
OceanStore: an architecture for global-scale persistent storage
ACM SIGPLAN Notices
Fail-stop processors: an approach to designing fault-tolerant computing systems
ACM Transactions on Computer Systems (TOCS)
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Byzantine generals in action: implementing fail-stop processors
ACM Transactions on Computer Systems (TOCS)
IEEE Transactions on Software Engineering
On k-Set Consensus Problems in Asynchronous Systems
IEEE Transactions on Parallel and Distributed Systems
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
The round complexity of verifiable secret sharing and secure multicast
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Simplifying fault-tolerance: providing the abstraction of crash failures
Journal of the ACM (JACM)
Interactive execution of distributed algorithms
Journal on Educational Resources in Computing (JERIC)
EW 4 Proceedings of the 4th workshop on ACM SIGOPS European workshop
Design of fault tolerant distributed systems: the fail-controlled approach
EW 4 Proceedings of the 4th workshop on ACM SIGOPS European workshop
Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Distributed probabilistic polling and applications to proportionate agreement
Information and Computation
Group orientation: a paradigm for modern distributed systems
EW 5 Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring
An implementation and analysis of the virtual interface architecture
SC '98 Proceedings of the 1998 ACM/IEEE conference on Supercomputing
On the composition of authenticated byzantine agreement
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures
Computing in totally anonymous asynchronous shared memory systems
Information and Computation
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Active disk paxos with infinitely many processes
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Detectable byzantine agreement secure against faulty majorities
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Evaluating the running time of a communication round over the internet
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Asynchronous verifiable secret sharing and proactive cryptosystems
Proceedings of the 9th ACM conference on Computer and communications security
Is byzantine agreement useful in a distributed database?
PODS '84 Proceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems
Impossibility of distributed consensus with one faulty process
PODS '83 Proceedings of the 2nd ACM SIGACT-SIGMOD symposium on Principles of database systems
A recovery algorithm for a distributed database system
PODS '83 Proceedings of the 2nd ACM SIGACT-SIGMOD symposium on Principles of database systems
Simplifying distributed database systems design by using a broadcast network
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Extracting guarantees from chaos
Communications of the ACM
The Derivation and Experimental Verification of Clock Synchronization Theory
IEEE Transactions on Computers
Computing Reliability Intervals for k-Resilient Protocols
IEEE Transactions on Computers
Optimal Agreement Protocol in Malicious Faulty Processors and Faulty Links
IEEE Transactions on Knowledge and Data Engineering
An Architecture for Survivable Coordination in Large Distributed Systems
IEEE Transactions on Knowledge and Data Engineering
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment
IEEE Transactions on Knowledge and Data Engineering
A Performance Evaluation Study of Pipeline TMR Systems
IEEE Transactions on Parallel and Distributed Systems
Consensus With Dual Failure Modes
IEEE Transactions on Parallel and Distributed Systems
Reliable Distributed Sorting Through the Application-Oriented Fault Tolerance Paradigm
IEEE Transactions on Parallel and Distributed Systems
Reaching Approximate Agreement with Mixed-Mode Faults
IEEE Transactions on Parallel and Distributed Systems
Interleaved All-to-All Reliable Broadcast on Meshes and Hypercubes
IEEE Transactions on Parallel and Distributed Systems
Formal Verification of Algorithms for Critical Systems
IEEE Transactions on Software Engineering
Local majorities, coalitions and monopolies in graphs: a review
Theoretical Computer Science
The customizable fault/error model for dependable distributed systems
Theoretical Computer Science - Dependable computing
The Database State Machine Approach
Distributed and Parallel Databases
Garbage Collection in a Distributed Object-Oriented System
IEEE Transactions on Knowledge and Data Engineering
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
A Fault Tolerant Clock Synchronization Algorithm for Systems with Low-Precision Oscillators
EDCC-3 Proceedings of the Third European Dependable Computing Conference on Dependable Computing
Muteness Failure Detectors: Specification and Implementation
EDCC-3 Proceedings of the Third European Dependable Computing Conference on Dependable Computing
A Novel Distributed Algorithm for High-Throughput and Scalable Gossiping
HPCN Europe 2000 Proceedings of the 8th International Conference on High-Performance Computing and Networking
Checking a Non-Byzantine FT Scheme against Byzantine Faults
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
The Agreement Problem Protocol Verification Environment
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Formal Methods for the International Space Station ISS
Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel)
Self-Testing/Correcting Protocols (Extended Abstract)
Proceedings of the 13th International Symposium on Distributed Computing
Byzantine Agreement Secure against General Adversaries in the Dual Failure Model
Proceedings of the 13th International Symposium on Distributed Computing
Lower Bounds in Distributed Computing
DISC '00 Proceedings of the 14th International Conference on Distributed Computing
The Complexity of Synchronous Iterative Do-All with Crashes
DISC '01 Proceedings of the 15th International Conference on Distributed Computing
Optimal Unconditional Information Diffusion
DISC '01 Proceedings of the 15th International Conference on Distributed Computing
Ruminations on Domain-Based Reliable Broadcast
DISC '02 Proceedings of the 16th International Conference on Distributed Computing
Secure Computation without Agreement
DISC '02 Proceedings of the 16th International Conference on Distributed Computing
Combining Methods for the Livelock Analysis of a Fault-Tolerant System
AMAST '98 Proceedings of the 7th International Conference on Algebraic Methodology and Software Technology
Distributed Probabilistic Polling and Applications to Proportionate Agreement
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Encapsulating Failure Detection: From Crash to Byzantine Failures
Ada-Europe '02 Proceedings of the 7th Ada-Europe International Conference on Reliable Software Technologies
Information-Theoretic Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Secure and Efficient Asynchronous Broadcast Protocols
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On 2-Round Secure Multiparty Computation
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Bus Architectures for Safety-Critical Embedded Systems
EMSOFT '01 Proceedings of the First International Workshop on Embedded Software
An Overview of Formal Verification for the Time-Triggered Architecture
FTRTFT '02 Proceedings of the 7th International Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems: Co-sponsored by IFIP WG 2.2
On the Hardness of Approximating Minimum Monopoly Problems
FST TCS '02 Proceedings of the 22nd Conference Kanpur on Foundations of Software Technology and Theoretical Computer Science
Agreement Problems in Fault-Tolerant Distributed Systems
SOFSEM '01 Proceedings of the 28th Conference on Current Trends in Theory and Practice of Informatics Piestany: Theory and Practice of Informatics
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
Detecting Manipulated Remote Call Streams
Proceedings of the 11th USENIX Security Symposium
Membrane Systems and Distributed Computing
WMC-CdeA '02 Revised Papers from the International Workshop on Membrane Computing
Formal Validation of the GUARDS Inter-Consistency Mechanism
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Adaptability and the Usefulness of Hints (Extended Abstract)
ESA '98 Proceedings of the 6th Annual European Symposium on Algorithms
Design guidelines for robust Internet protocols
ACM SIGCOMM Computer Communication Review
A survey of permission-based distributed mutual exclusion algorithms
Computer Standards & Interfaces
Diffusion without false rumors: on propagating updates in a Byzantine environment
Theoretical Computer Science
A High-Throughput Secure Reliable Multicast Protocol
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Verification of fault tolerance and real time
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
Reconfiguration and transient recovery in state machine architectures
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
Are CORBA Services Ready to Support Resource Management Middleware for Heterogeneous Computing?
HCW '99 Proceedings of the Eighth Heterogeneous Computing Workshop
Polynomial algorithms for multiple processor agreement
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Finding safe paths in a faulty environment
PODC '82 Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Bounds on information exchange for Byzantine Agreement
PODC '82 Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
The inherent cost of nonblocking commitment
PODC '83 Proceedings of the second annual ACM symposium on Principles of distributed computing
PODC '83 Proceedings of the second annual ACM symposium on Principles of distributed computing
Byzantine clock synchronization
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Asynchronous Byzantine consensus
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Patterns of communication in consensus protocols
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Randomized Byzantine Agreements
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Efficient solutions to the replicated log and dictionary problems
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
On the possibility and impossibility of achieving clock synchronization
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Specialized N-modular redundant processors in large-scale distributed systems
SRDS '96 Proceedings of the 15th Symposium on Reliable Distributed Systems
On Diffusing Updates in a Byzantine Environment
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
An Object-Oriented Fault-Tolerance Framework based on Specialization Techniques
WORDS '97 Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
Synchronous Consensus for Dependent Process Failures
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Enhancing The Fault-Tolerance of Nonmasking Programs
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Responsive Security for Stored Data
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Distributed consensus in the presence of sectional faults
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Efficient player-optimal protocols for strong and differential consensus
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Self-Stabilizing Mutual Exclusion in the Presence of Faulty Nodes
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Optimal Resiliency Against Mobile Faults
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Fault-Tolerant Static Scheduling for Real-Time Distributed Embedded Systems (Extended Abstract)
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Stability of long-lived consensus
Journal of Computer and System Sciences
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Optimal broadcasting in injured hypercubes using directed safety levels
Journal of Parallel and Distributed Computing - Special section best papers from the 2002 international parallel and distributed processing symposium
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Reaching agreement on an unknown network with partial graphic information
ACM SIGOPS Operating Systems Review
Hundreds of impossibility results for distributed computing
Distributed Computing - Papers in celebration of the 20th anniversary of PODC
Fault Tolerance in Collaborative Sensor Networks for Target Detection
IEEE Transactions on Computers
Proceedings of the conference on Design, automation and test in Europe - Volume 2
Virtual trees for the byzantine generals algorithm
Proceedings of the 35th SIGCSE technical symposium on Computer science education
The Information Structure of Indulgent Consensus
IEEE Transactions on Computers
Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Dual link fault diagnosis agreement
Journal of Systems and Software
Uniform consensus is harder than consensus
Journal of Algorithms
Revisiting fault diagnosis agreement in a new territory
ACM SIGOPS Operating Systems Review
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Proceedings of the 26th International Conference on Software Engineering
Low latency and cheat-proof event ordering for peer-to-peer games
NOSSDAV '04 Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video
Optimal early stopping uniform consensus in synchronous systems with process omission failures
Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures
Broadcast in radio networks tolerating byzantine adversarial behavior
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
What cannot be computed locally!
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
Electronic Commerce Research
Self-stabilizing clock synchronization in the presence of Byzantine faults
Journal of the ACM (JACM)
(Im)Possibility of Unconditionally Privacy-Preserving Auctions
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Secure reliable multicast protocols in a WAN
Distributed Computing
New application of reliable agreement: underlying an unsecured business environment
ACM SIGOPS Operating Systems Review
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Total order broadcast and multicast algorithms: Taxonomy and survey
ACM Computing Surveys (CSUR)
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous Byzantine Systems
IEEE Transactions on Dependable and Secure Computing
Intrusion-Tolerant Server Architecture for Survivable Services
The Journal of Supercomputing
Reaching fault diagnosis agreement on an unreliable general network
Information Sciences—Informatics and Computer Science: An International Journal
Fast and simple distributed consensus
Distributed Computing
Common knowledge and consistent simultaneous coordination
Distributed Computing
On reliable broadcast in a radio network
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Simultaneous broadcast revisited
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Reliable broadcast in unknown fixed-identity networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
The bounds of faulty components on consensus with dual failure modes
ACM SIGOPS Operating Systems Review
Authenticity and availability in PIPE networks
Future Generation Computer Systems - Special issue: P2P computing and interaction with grids
Low-cost clock synchronization
Distributed Computing
Efficient agreement using fault diagnosis
Distributed Computing
Automated Analysis of Fault-Tolerance in Distributed Systems
Formal Methods in System Design
Streets of consensus under unknown unreliable network
ACM SIGOPS Operating Systems Review
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance
IEEE Transactions on Dependable and Secure Computing
BAR fault tolerance for cooperative services
Proceedings of the twentieth ACM symposium on Operating systems principles
Fault-scalable Byzantine fault-tolerant services
Proceedings of the twentieth ACM symposium on Operating systems principles
An Architectural Approach for Decentralized Trust Management
IEEE Internet Computing
ACM SIGSOFT Software Engineering Notes
Addressing cheating in distributed MMOGs
NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games
Self-stabilizing operating systems
Proceedings of the twentieth ACM symposium on Operating systems principles
On-line automated performance diagnosis on thousands of processes
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice of parallel programming
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
BTS: a Byzantine fault-tolerant tuple space
Proceedings of the 2006 ACM symposium on Applied computing
The algorithm of pipelined gossiping
Journal of Systems Architecture: the EUROMICRO Journal
Active disk Paxos with infinitely many processes
Distributed Computing - Special issue: PODC 02
The inherent price of indulgence
Distributed Computing - Special issue: PODC 02
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
When selfish meets evil: byzantine players in a virus inoculation game
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Self-stabilizing byzantine agreement
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
How fast can a very robust read be?
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
A self-adjusting algorithm for byzantine agreement
Distributed Computing
Low complexity Byzantine-resilient consensus
Distributed Computing
Detecting and Isolating Malicious Routers
IEEE Transactions on Dependable and Secure Computing
A distributed host-based worm detection system
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Secure multi-party computation made simple
Discrete Applied Mathematics - Special issue: Coding and cryptography
Orchestrating fair exchanges between mutually distrustful web services
Proceedings of the 3rd ACM workshop on Secure web services
ACM Transactions on Information and System Security (TISSEC)
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
The Do-All problem with Byzantine processor failures
Theoretical Computer Science - Foundations of software science and computation structures
On the composition of authenticated Byzantine Agreement
Journal of the ACM (JACM)
Robust gossiping with an application to consensus
Journal of Computer and System Sciences
Eventually Dual Failure Agreement
Fundamenta Informaticae
UbiSrvInt - a context-aware fault-tolerant approach toward wireless P2P service provision
Expert Systems with Applications: An International Journal
Self-healing systems - survey and synthesis
Decision Support Systems
Worm-IT - A wormhole-based intrusion-tolerant group communication system
Journal of Systems and Software
Optimal resilient threshold GQ signatures
Information Sciences: an International Journal
Protecting online games against cheating
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Markets vs auctions: Approaches to distributed combinatorial resource scheduling
Multiagent and Grid Systems - Smart Grid Technologies & Market Models
The perfectly synchronized round-based model of distributed computing
Information and Computation
Specifying and using intrusion masking models to process distributed operations
Journal of Computer Security
On modeling and tolerating incorrect software
Journal of High Speed Networks - Self-Stabilizing Systems, Part 2
Selecting a distributed agreement algorithm
Proceedings of the 2007 ACM symposium on Applied computing
Dual agreement virtual subnet protocol for mobile ad-hoc networks
Proceedings of the 2007 ACM symposium on Applied computing
New techniques for ensuring the long term integrity of digital archives
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
An examination of vote verification technologies: findings and experiences from the Maryland study
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
The case for Byzantine fault detection
HOTDEP'06 Proceedings of the 2nd conference on Hot Topics in System Dependability - Volume 2
Ursa minor: versatile cluster-based storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Efficient Routing and Broadcasting in Recursive Interconnection Networks
ICPP '94 Proceedings of the 1994 International Conference on Parallel Processing - Volume 01
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Antiquity: exploiting a secure log for wide-area distributed storage
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Ranking factors in peer-to-peer overlay networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Tolerating corrupted communication
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Performance study of Byzantine Agreement Protocol with artificial neural network
Information Sciences: an International Journal
The adequacy of languages for representing interaction mechanisms
Information Systems Frontiers
Agreement in synchronous networks with ubiquitous faults
Theoretical Computer Science
Low-overhead byzantine fault-tolerant storage
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Attested append-only memory: making adversaries stick to their word
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
HQ replication: a hybrid quorum protocol for byzantine fault tolerance
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Diconic addition of failsafe fault-tolerance
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
ACM Transactions on Information and System Security (TISSEC)
Secure content access and replication in pure P2P networks
Computer Communications
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Model checking for the practical verificationist: a user's perspective on SAL
Proceedings of the second workshop on Automated formal methods
A survey of linguistic structures for application-level fault tolerance
ACM Computing Surveys (CSUR)
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Middleware for semantic-based security and safety management of open services
International Journal of Web and Grid Services
How to avoid packet droppers with proactive routing protocols for ad hoc networks
International Journal of Network Management
Statecharts Composition To Model Topologically Distributed Applications
Journal of Integrated Design & Process Science
A distributed coordination protocol in an order-heterogeneous group
International Journal of Web and Grid Services
Mobile-agent-based collaborative sensor fusion
Information Fusion
Practical trust management without reputation in peer-to-peer games
Multiagent and Grid Systems - Grid Computing, high performance and distributed applications
Privacy preserving set intersection based on bilinear groups
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Jgroup-ARM: a distributed object group platform with autonomous replication management
Software—Practice & Experience
Designing and implementing malicious hardware
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Information Processing Letters
Zyzzyva: speculative Byzantine fault tolerance
Communications of the ACM - Remembering Jim Gray
Malicious node detection in wireless sensor networks using weighted trust evaluation
Proceedings of the 2008 Spring simulation multiconference
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Research note: On Byzantine generals with alternative plans
Journal of Parallel and Distributed Computing
Design for survivability: a tradeoff space
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
From cells to organisms: long-term guarantees on service provisioning in peer-to-peer networks
NOTERE '08 Proceedings of the 8th international conference on New technologies in distributed systems
Round-Efficient Secure Computation in Point-to-Point Networks
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions
ICSOC '07 Proceedings of the 5th international conference on Service-Oriented Computing
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Design, Implementation and Deployment of State Machines Using a Generative Approach
Architecting Dependable Systems V
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Financial Cryptography and Data Security
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Making an Agreement in an Order-Heterogeneous Group
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
SYCRAFT: A Tool for Synthesizing Distributed Fault-Tolerant Programs
CONCUR '08 Proceedings of the 19th international conference on Concurrency Theory
How to Solve Consensus in the Smallest Window of Synchrony
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Local Terminations and Distributed Computability in Anonymous Networks
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Constant-Space Localized Byzantine Consensus
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Optimizing Threshold Protocols in Adversarial Structures
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Bosco: One-Step Byzantine Asynchronous Consensus
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Proceedings of the 1st Workshop on Social Network Systems
A Fault-Tolerant Model of Wireless Sensor-Actuator Network
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
A general characterization of indulgence
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Dynamic hybrid fault models and the applications to wireless sensor networks (WSNs)
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
A self-stabilizing autonomic recoverer for eventual Byzantine software
Journal of Systems and Software
Multicast survivability in hierarchical broadcast networks
WSEAS TRANSACTIONS on COMMUNICATIONS
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
The threat of uncertainty in service-oriented architecture
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
On the requirements of new software development
International Journal of Business Intelligence and Data Mining
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
On expected constant-round protocols for Byzantine agreement
Journal of Computer and System Sciences
Resilient software mirroring with untrusted third parties
Proceedings of the 1st International Workshop on Hot Topics in Software Upgrades
Write Markers for Probabilistic Quorum Systems
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Byzantine Consensus with Unknown Participants
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Revising Distributed UNITY Programs Is NP-Complete
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment
Fundamenta Informaticae
An early fault diagnosis agreement under hybrid fault model
Expert Systems with Applications: An International Journal
Journal of Network and Computer Applications
Improving fault-tolerant scheme for a time-sensitive autonomous local wireless sensor network
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Dependability assessment of by-wire control systems using fault injection
Journal of Systems Architecture: the EUROMICRO Journal
Data aggregation in partially connected networks
Computer Communications
Model checking nash equilibria in MAD distributed systems
Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design
Realistic Failures in Secure Multi-party Computation
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Design and implementation of a Byzantine fault tolerance framework for Web services
Journal of Systems and Software
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
TrInc: small trusted hardware for large distributed systems
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Making Byzantine fault tolerant systems tolerate Byzantine faults
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
Adaptive Fault Tolerance for Scalable Cluster Computing in Space
International Journal of High Performance Computing Applications
GenLM: License Management for Grid and Cloud Computing Environments
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Fast scalable deterministic consensus for crash failures
Proceedings of the 28th ACM symposium on Principles of distributed computing
Consensus in the presence of partial synchrony (Preliminary Version)
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Efficient and secure protocols for privacy-preserving set operations
ACM Transactions on Information and System Security (TISSEC)
A lightweight fault tolerance framework for Web services
Web Intelligence and Agent Systems
RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
On the round complexity of Byzantine agreement without initial set-up
Information and Computation
Symmetric active/active metadata service for high availability parallel file systems
Journal of Parallel and Distributed Computing
Automating the addition of fault tolerance with discrete controller synthesis
Formal Methods in System Design
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Standards & Interfaces
Byzantine Agreement under dual failure mobile network
Computer Standards & Interfaces
Distributed detection in the presence of Byzantine attacks
IEEE Transactions on Signal Processing
Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Zyzzyva: Speculative Byzantine fault tolerance
ACM Transactions on Computer Systems (TOCS)
A protocol for reliably, flexibly, and efficiently making agreement among peers
International Journal of Web and Grid Services
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Deontic Logic, Contrary to Duty Reasoning and Fault Tolerance
Electronic Notes in Theoretical Computer Science (ENTCS)
Computers and Electrical Engineering
The anatomy study of consensus agreement in MANETs
Computers and Electrical Engineering
Reliable relaying with uncertain knowledge
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Proactive Byzantine Quorum Systems
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
The Design of Finite State Machine for Asynchronous Replication Protocol
ICIC '07 Proceedings of the 3rd International Conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Unifying Byzantine Consensus Algorithms with Weak Interactive Consistency
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Of Choices, Failures and Asynchrony: The Many Faces of Set Agreement
ISAAC '09 Proceedings of the 20th International Symposium on Algorithms and Computation
Long-term data resilience using opinion polls
Long-term data resilience using opinion polls
Rapid P2P overlay network programming on a distributed reduction machine
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
The quadratic Gaussian CEO problem with Byzantine agents
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
An algebraic watchdog for wireless network coding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
ACC'09 Proceedings of the 2009 conference on American Control Conference
Secure multi-party computation made simple
Discrete Applied Mathematics - Special issue: Coding and cryptography
Modeling Web Applications by the Multiple Levels of Integrity Policy
Electronic Notes in Theoretical Computer Science (ENTCS)
Modular construction of a Byzantine agreement protocol with optimal message bit complexity
Information and Computation
International Journal of Systems, Control and Communications
Towards dual fallible agreement in a virtual subnet network
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Approximate strong equilibrium in job scheduling games
Journal of Artificial Intelligence Research
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
Computer Networks: The International Journal of Computer and Telecommunications Networking
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Software fault tolerance: an overview
Ada-Europe'03 Proceedings of the 8th Ada-Europe international conference on Reliable software technologies
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Self-stabilizing device drivers
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
A dependable intrusion detection architecture based on agreement services
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
A Byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Monadic second-order logics with cardinalities
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
A framework of safe stabilization
SSS'03 Proceedings of the 6th international conference on Self-stabilizing systems
Towards optimal and efficient perfectly secure message transmission
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Dynamic system reconfiguration via service composition for dependable computing
Proceedings of the 12th Monterey conference on Reliable systems on unreliable networked platforms
Two-threshold broadcast and detectable multi-party computation
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Secure multi-party computation made simple
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A fault-tolerant scheme for an autonomous local wireless sensor network
Computer Standards & Interfaces
Enforcing honesty in assured information sharing within a distributed system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A case for the accountable cloud
ACM SIGOPS Operating Systems Review
Asynchronous Byzantine consensus with 2f+1 processes
Proceedings of the 2010 ACM Symposium on Applied Computing
Using auction based group formation for collaborative networking in Ubicomp
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
A framework for Incorporating trust into formal systems development
ICTAC'07 Proceedings of the 4th international conference on Theoretical aspects of computing
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
The reliability of detection in wireless sensor networks: modeling and analyzing
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
A cross-layered diagnostician in OSGI platform for home network
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Clock synchronization in the Byzantine-recovery failure model
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
From an intermittent rotating star to a leader
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
Making distributed applications robust
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
Modeling agreement problems in the universal composability framework
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Secure failure detection in TrustedPals
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Secure and self-stabilizing clock synchronization in sensor networks
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
The building blocks of consensus
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Game authority for robust and scalable distributed selfish-computer systems
Theoretical Computer Science
Almost-everywhere secure computation
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
A gossip-based protocol to reach consensus via uninorm aggregation operator
GPC'08 Proceedings of the 3rd international conference on Advances in grid and pervasive computing
Evaluating peer-to-peer for loosely coupled business collaboration: a case study
BPM'07 Proceedings of the 5th international conference on Business process management
Nonlinear network coding is necessary to combat general Byzantine attacks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
ACM Transactions on Algorithms (TALG)
On the evolution of adversary models in security protocols: or know your friend and foe alike
Proceedings of the 13th international conference on Security protocols
MPC vs. SFE: perfect security in a unified corruption model
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Practical impact of group communication theory
Future directions in distributed computing
Randomization can be a healer: consensus with dynamic omission failures
DISC'09 Proceedings of the 23rd international conference on Distributed computing
ACM Transactions on Computer Systems (TOCS)
Secure token passing at application level
Future Generation Computer Systems
On counteracting byzantine attacks in network coded peer-to-peer networks
IEEE Journal on Selected Areas in Communications
Automation and Remote Control
Agent-oriented programming: from prolog to guarded definite clauses
Agent-oriented programming: from prolog to guarded definite clauses
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Improving robustness in an autonomous local sensor network
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Output-sensitive decoding for redundant residue systems
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests
ACM SIGOPS Operating Systems Review
Scalable byzantine computation
ACM SIGACT News
The byzantine empire in the intercloud
ACM SIGACT News
Prophecy: using history for high-throughput fault tolerance
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Object storage on CRAQ: high-throughput chain replication for read-mostly workloads
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Secure multi-path data deliver in sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Reliable data-center scale computations
Proceedings of the 4th International Workshop on Large Scale Distributed Systems and Middleware
Capacity of byzantine agreement: summary of recent results
Proceedings of the 2010 ACM workshop on Wireless of the students, by the students, for the students
Achieving efficient agreement within a dual-failure cloud-computing environment
Expert Systems with Applications: An International Journal
Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras
Atomic commit protocols, their integration, and their optimisations in distributed database systems
International Journal of Intelligent Information and Database Systems
A domain-specific approach to architecturing error handling in pervasive computing
Proceedings of the ACM international conference on Object oriented programming systems languages and applications
Distributed agreement with optimal communication complexity
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
An analysis of the Ariane 5 flight 501 failure - a system engineering perspective
ECBS'97 Proceedings of the 1997 international conference on Engineering of computer-based systems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Improved fault tolerance and secure computation on sparse networks
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Secure multiparty computation with minimal interaction
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
The failure detector abstraction
ACM Computing Surveys (CSUR)
Security evaluation of layered intrusion tolerant systems
ASMTA'10 Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications
Adaptive fault tolerance for many-core based space-borne computing
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
A communication based model for games of imperfect information
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
The impact of topology on Byzantine containment in stabilization
DISC'10 Proceedings of the 24th international conference on Distributed computing
Increasing web service dependability through consensus voting
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
Distributed detection in the presence of Byzantine attack in large wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
A strategyproof mechanism for scheduling divisible loads in bus networks without control processors
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Depot: cloud storage with minimal trust
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
SPORC: group collaboration using untrusted cloud resources
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
On byzantine containment properties of the min + 1 protocol
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Authenticated broadcast with a partially compromised public-key infrastructure
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Complexity issues in automated model revision without explicit legitimate state
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Recursion in distributed computing
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
On device identity establishment and verification
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
International Journal of Applied Cryptography
Self-stabilizing Byzantine asynchronous unison
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
Signature-free broadcast-based intrusion tolerance: never decide a Byzantine value
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
A faster P solution for the Byzantine agreement problem
CMC'10 Proceedings of the 11th international conference on Membrane computing
A necessary and sufficient synchrony condition for solving Byzantine consensus in symmetric networks
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
International Journal of Bio-Inspired Computation
A course in advanced operating systems using MPI for projects
Journal of Computing Sciences in Colleges
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
AIKED'11 Proceedings of the 10th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
Paxos replicated state machines as the basis of a high-performance data store
Proceedings of the 8th USENIX conference on Networked systems design and implementation
The case for byzantine fault detection
HotDep'06 Proceedings of the Second conference on Hot topics in system dependability
Distributed and fault-tolerant execution framework for transaction processing
Proceedings of the 4th Annual International Conference on Systems and Storage
Frailty modelling for risk analysis in network security and survivability
International Journal of Information and Computer Security
Byzantine agreement with homonyms
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
The complexity of robust atomic storage
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Adaptively secure broadcast, revisited
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Accurate byzantine agreement with feedback
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Validity bound of regular registers with churn and byzantine processes
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Transforming worst-case optimal solutions for simultaneous tasks into all-case optimal solutions
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
A co-commitment based secure data collection scheme for tiered wireless sensor networks
Journal of Systems Architecture: the EUROMICRO Journal
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Proceedings of the Nineteenth International Workshop on Quality of Service
Improved bounded model checking for a fair branching-time temporal epistemic logic
MoChArt'10 Proceedings of the 6th international conference on Model checking and artificial intelligence
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Secure message transmission by public discussion: a brief survey
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
On composability of reliable unicast and broadcast
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Authenticated Byzantine generals in dual failure model
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
ScatterD: Spatial deployment optimization with hybrid heuristic/evolutionary algorithms
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Cyberdice: peer-to-peer gambling in the presence of cheaters
Security'08 Proceedings of the 16th International conference on Security protocols
TMPR-scheme for reliably broadcast messages among peer processes
International Journal of Grid and Utility Computing
Player-centric Byzantine agreement
ICALP'11 Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I
Secure and self-stabilizing clock synchronization in sensor networks
Theoretical Computer Science
Synchronous consensus under hybrid process and link failures
Theoretical Computer Science
An investigation of the vulnerabilities of scale invariant dynamics in large teams
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Reconciling fault-tolerant distributed algorithms and real-time computing
SIROCCO'11 Proceedings of the 18th international conference on Structural information and communication complexity
On the performance of a retransmission-based synchronizer
SIROCCO'11 Proceedings of the 18th international conference on Structural information and communication complexity
Multiparty equality function computation in networks with point-to-point links
SIROCCO'11 Proceedings of the 18th international conference on Structural information and communication complexity
N-party BAR Transfer: motivation, definition, and challenges
Proceedings of the 3rd International Workshop on Theoretical Aspects of Dynamic Distributed Systems
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Feasibility of Stepwise Design of Multitolerant Programs
ACM Transactions on Software Engineering and Methodology (TOSEM)
Depot: Cloud Storage with Minimal Trust
ACM Transactions on Computer Systems (TOCS)
Maximum metric spanning tree made Byzantine tolerant
DISC'11 Proceedings of the 25th international conference on Distributed computing
Byzantine agreement using partial authentication
DISC'11 Proceedings of the 25th international conference on Distributed computing
Developing a consensus algorithm using stepwise refinement
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
Proactive resilience to dropping nodes in mobile ad hoc networks
AINTEC'06 Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks
CRUTIAL: the blueprint of a reference critical information infrastructure architecture
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Zone-Oriented byzantine agreement on zone-based wireless ad-hoc network
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A topological condition for solving fair exchange in byzantine environments
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A p2p content authentication protocol based on byzantine agreement
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Discovering network topology in the presence of byzantine faults
SIROCCO'06 Proceedings of the 13th international conference on Structural Information and Communication Complexity
Memory management for self-stabilizing operating systems
SSS'05 Proceedings of the 7th international conference on Self-Stabilizing Systems
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Spreading alerts quietly and the subgroup escape problem
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
RAIDb: redundant array of inexpensive databases
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Renaming in message passing systems with byzantine failures
DISC'06 Proceedings of the 20th international conference on Distributed Computing
Replication predicates for dependent-failure algorithms
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
A secure checkpointing protocol for survivable server design
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Trust enforcement in peer-to-peer massive multi-player online games
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Group-Based scheduling scheme for result checking in global computing systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
PeerMint: decentralized and secure accounting for peer-to-peer applications
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Majority and unanimity in synchronous networks with ubiquitous dynamic faults
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
A formal model for fault-tolerance in distributed systems
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
Public-key cryptography and availability
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
A practical distributed mutual exclusion protocol in dynamic peer-to-peer systems
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
TrustedPals: secure multiparty computation implemented with smart cards
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
On efficient models for model checking message-passing distributed protocols
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
On correctness and privacy in distributed mechanisms
AMEC'05 Proceedings of the 2005 international conference on Agent-Mediated Electronic Commerce: designing Trading Agents and Mechanisms
Universally composable simultaneous broadcast
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
On expected constant-round protocols for byzantine agreement
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Architecting and implementing versatile dependability
Architecting Dependable Systems III
Improving server applications with system transactions
Proceedings of the 7th ACM european conference on Computer Systems
Our data, ourselves: privacy via distributed noise generation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Dynamics of learning algorithms for the on-demand secure byzantine routing protocol
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Verifiable agreement: limits of non-repudiation in mobile peer-to-peer ad hoc networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Applied formal methods – from CSP to executable hybrid specifications
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Autonomous agent based distributed fault-tolerant intrusion detection system
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Self-stabilising protocols on oriented chains with joins and leaves
International Journal of Autonomous and Adaptive Communications Systems
Fused state machines for fault tolerance in distributed systems
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
Accurate byzantine agreement with feedback
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
Byzantine agreement with homonyms in synchronous systems
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Beyond traces and independence
Dependable and Historic Computing
Performance evaluation of large-scale dynamic systems
ACM SIGMETRICS Performance Evaluation Review
Consensus of multi-agent networks in the presence of adversaries using only local information
Proceedings of the 1st international conference on High Confidence Networked Systems
Low complexity resilient consensus in networked multi-agent systems with adversaries
Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control
Secure message transmission in asynchronous directed graphs
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Journal of Network and Computer Applications
Research note: Self-stabilizing byzantine asynchronous unison
Journal of Parallel and Distributed Computing
Sensor network data fault detection with maximum a posteriori selection and bayesian modeling
ACM Transactions on Sensor Networks (TOSN)
Integrated approach to open distributed management
Computer Communications
Automated model repair for distributed programs
ACM SIGACT News
To reach consensus using uninorm aggregation operator: A gossip-based protocol
International Journal of Intelligent Systems
Survey: Robust and scalable middleware for selfish-computer systems
Computer Science Review
On the (limited) power of non-equivocation
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Byzantine broadcast in point-to-point networks using local linear coding
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Runtime verification for ultra-critical systems
RV'11 Proceedings of the Second international conference on Runtime verification
Evidence theory for reputation-based trust in wireless sensor networks
Proceedings of the 3rd International Conference on Computing for Geospatial Research and Applications
Encapsulating deontic and branching time specifications
Theoretical Computer Science
Edge fault tolerance on sparse networks
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part II
Byzantine agreement with a rational adversary
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part II
Data mobility in peer-to-peer systems to improve robustness
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment
Fundamenta Informaticae
FUN'12 Proceedings of the 6th international conference on Fun with Algorithms
Homonyms with forgeable identifiers
SIROCCO'12 Proceedings of the 19th international conference on Structural Information and Communication Complexity
Eventually Dual Failure Agreement
Fundamenta Informaticae
Dependability modeling and analysis of software systems specified with UML
ACM Computing Surveys (CSUR)
Efficient Diagnosis Protocol to Enhance the Reliability of a Cloud Computing Environment
Journal of Network and Systems Management
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
From crash-stop to permanent omission: automatic transformation and weakest failure detectors
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Probabilistic opaque quorum systems
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems
Proceedings of the 2012 workshop on New security paradigms
Scalable byzantine agreement with a random beacon
SSS'12 Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems
All-to-All gradecast using coding with byzantine failures
SSS'12 Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems
Formal verification of distributed algorithms: from pseudo code to checked proofs
TCS'12 Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science
Computability in distributed computing: a Tutorial
ACM SIGACT News
On byzantine broadcast in loosely connected networks
DISC'12 Proceedings of the 26th international conference on Distributed Computing
Adaptive request batching for byzantine replication
ACM SIGOPS Operating Systems Review
Quantitative survivability evaluation of three virtual machine-based server architectures
Journal of Network and Computer Applications
Iwazaru: the byzantine sequencer
ARCS'13 Proceedings of the 26th international conference on Architecture of Computing Systems
Augustus: scalable and robust storage for cloud applications
Proceedings of the 8th ACM European Conference on Computer Systems
Verifying multicast-based security protocols using the inductive method
Proceedings of the 28th Annual ACM Symposium on Applied Computing
What's a little collusion between friends?
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Byzantine vector consensus in complete graphs
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Highly dynamic distributed computing with byzantine failures
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Avoiding disruptive failovers in transaction processing systems with multiple active nodes
Journal of Parallel and Distributed Computing
Byzantine agreement in polynomial expected time: [extended abstract]
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Cooperative security in distributed networks
Computer Communications
On the robust synthesis of logical consensus algorithms for distributed intrusion detection
Automatica (Journal of IFAC)
Theoretical Computer Science
Byzantine agreement with homonyms in synchronous systems
Theoretical Computer Science
PoWerStore: proofs of writing for efficient and robust storage
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
COLO: COarse-grained LOck-stepping virtual machines for non-stop service
Proceedings of the 4th annual Symposium on Cloud Computing
Towards privacy-preserving fault detection
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems
Reasoning with MAD distributed systems
CONCUR'13 Proceedings of the 24th international conference on Concurrency Theory
Collaborative localization in visual sensor networks
ACM Transactions on Sensor Networks (TOSN)
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
ACM Transactions on Storage (TOS)
Energy-efficient Passive Replication of a Process in Mobile Environment
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference
On the performance of a retransmission-based synchronizer
Theoretical Computer Science
Copilot: monitoring embedded systems
Innovations in Systems and Software Engineering
A virtual grouping based fault-tolerant scheme for autonomous networks
Engineering Applications of Artificial Intelligence
Achieving Accountable MapReduce in cloud computing
Future Generation Computer Systems
A formal methodology for integral security design and verification of network protocols
Journal of Systems and Software
Information and Computation
Authenticated broadcast with a partially compromised public-key infrastructure
Information and Computation
Computational Aspects of Uncertainty Profiles and Angel-Daemon Games
Theory of Computing Systems
A simple Byzantine Generals protocol
Journal of Combinatorial Optimization
HARDFS: hardening HDFS with selective and lightweight versioning
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
The optimal generalized Byzantine Agreement in Cluster-based Wireless Sensor Networks
Computer Standards & Interfaces
Scalable and leaderless Byzantine consensus in cloud computing environments
Information Systems Frontiers
Energy-aware passive replication of processes
Journal of Mobile Multimedia
Hi-index | 0.11 |