Sciweavers

27 search results - page 1 / 6
» Niobe: A practical replication protocol
Sort
View
50
Voted
TOS
2008
83views more  TOS 2008»
14 years 10 months ago
Niobe: A practical replication protocol
John MacCormick, Chandramohan A. Thekkath, Marcus ...
DSN
2008
IEEE
15 years 4 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
78
Voted
ICPADS
2007
IEEE
15 years 4 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
91
Voted
CCS
2011
ACM
13 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
68
Voted
VLDB
2005
ACM
97views Database» more  VLDB 2005»
15 years 3 months ago
Fine-Grained Replication and Scheduling with Freshness and Correctness Guarantees
Lazy replication protocols provide good scalability properties by decoupling transaction execution from the propagation of new values to replica sites while guaranteeing a correct...
Fuat Akal, Can Türker, Hans-Jörg Schek, ...