Verifiable secret sharing and multiparty protocols with honest majority
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Byzantine Agreement in a Generalized Connected Network
IEEE Transactions on Parallel and Distributed Systems
Bounds on information exchange for Byzantine agreement
Journal of the ACM (JACM)
Agreement under faulty interfaces
Information Processing Letters
Consensus under unreliable transmission
Information Processing Letters
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Supporting Mutual Understanding in Collaborative Design Project
APCHI '98 Proceedings of the Third Asian Pacific Computer and Human Interaction
Effects of computer-mediated communication on group negotiation: an empirical study
HICSS '95 Proceedings of the 28th Hawaii International Conference on System Sciences
Optimized Authenticated Self-Synchronizing Byzantine Agreement Protocols
PRFTS '97 Proceedings of the 1997 Pacific Rim International Symposium on Fault-Tolerant Systems
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
A Client-Server Approach to Virtually Synchronous Group Multicast: Specifications and Algorithms
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Fault-tolerant causal delivery in group communication
ICPADS '96 Proceedings of the 1996 International Conference on Parallel and Distributed Systems
Hi-index | 0.00 |
Due to the enterprise internationalization nowadays, each sub-company of the enterprise is located in different place. Under such circumstances, each sub-company must better itself with greater power and ability through coordination. Unfortunately, malicious hacker possibly fakes the communications between the sub-companies. The messages from sub-company might be changed in an unsecured environment. Thus, this paper proposes the Two-Phase Agreement (TPA) protocol to make easy the sub-companies' communication with the main-company or decision-making in company conference.