• Aucun résultat trouvé

[PDF] Top 20 Byzantine Agreement with Homonyms

Has 10000 "Byzantine Agreement with Homonyms" found on our website. Below are the top 20 most common "Byzantine Agreement with Homonyms".

Byzantine Agreement with Homonyms

Byzantine Agreement with Homonyms

... systems with homonyms gives us a better understanding of the importance of identifiers in distributed computing, and there are two additional motivations for the new ...that Byzantine ... Voir le document complet

19

Byzantine Agreement with Homonyms (Accord Byzantin avec des Homonymes)

Byzantine Agreement with Homonyms (Accord Byzantin avec des Homonymes)

... reach agreement in a system of n pro- cesses, up to t of which can be ...solving Byzantine agreement, even when ℓ = n [PSL80,LSP82], and it thus applies also for systems with ...synchronous ... Voir le document complet

5

Synchronous byzantine agreement with nearly a cubic number of communication bits

Synchronous byzantine agreement with nearly a cubic number of communication bits

... A Byzantine agreement protocol has to satisfy the following three properties: In this paper we consider deterministic synchronous round-based ...of Byzantine processes that can be tolerated — ideally ... Voir le document complet

16

Intrusion-Tolerant Broadcast and Agreement Abstractions in the Presence of Byzantine Processes

Intrusion-Tolerant Broadcast and Agreement Abstractions in the Presence of Byzantine Processes

... paper: Byzantine-tolerant agreement abstraction The most important agreement ab- straction encountered in distributed systems prone to process failures is consensus ([1, 5, 15, 26], to cite only ... Voir le document complet

25

Minimal Synchrony for Asynchronous Byzantine Consensus

Minimal Synchrony for Asynchronous Byzantine Consensus

... Asynchronous Byzantine Consensus Zohir Bouzid* Achour Mostéfaoui** Michel Raynal*** **** Abstract: Solving the consensus problem requires in one way or another that the underlying system satisfies some synchrony ... Voir le document complet

20

Brief announcement: Practical synchronous byzantine consensus

Brief announcement: Practical synchronous byzantine consensus

... speaking, Byzantine consensus considers the problem of reaching agreement among a group of n parties, among which up to f can have Byzantine faults and deviate from the protocol ...the ... Voir le document complet

5

UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies

UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies

... Thus identifiers that have longer prefix in common are closer to each other, and for any point p and distance ∆ there is exactly one point q such that D(p, q) = ∆ (which does not hold for the Hamming distance). Nodes ... Voir le document complet

9

On Byzantine Broadcast in Loosely Connected Networks

On Byzantine Broadcast in Loosely Connected Networks

... considers Byzantine agreement on arbitrary graphs, and states that for agreement in the presence of up to k Byzantine nodes, it is necessary and sufficient that the network is (2k + ... Voir le document complet

15

A Scalable Byzantine Grid

A Scalable Byzantine Grid

... for agreement in the presence of up to k Byzantine nodes, it is necessary and sufficient that the network is (2k +1)-connected, and that the number of nodes in the system is at least 3k + 1 ...only ... Voir le document complet

18

Modular randomized byzantine k-set agreement in asynchronous message-passing systems

Modular randomized byzantine k-set agreement in asynchronous message-passing systems

... (where MV stands for “Multivalued Validated”), allows the non-faulty processes to exchange values in such a way that all the non-faulty processes eventually obtain the same set of values, and none of these values is from ... Voir le document complet

18

Homonyms with forgeable identifiers

Homonyms with forgeable identifiers

... The Byzantine Agreement algorithm of Figure 3 directly works with l > t + k if we have an Authenticated ...Broadcast with l > k + ...simply with authentication: it suffices to ... Voir le document complet

13

Minimal Synchrony for Byzantine Consensus

Minimal Synchrony for Byzantine Consensus

... enriched with message authentication, and (b) where the channels are bidirectional and have the same timing properties in both directions, it follows that it is also necessary and sufficient in the weaker system ... Voir le document complet

16

Communication and Agreement Abstractions in the Presence of Byzantine Processes

Communication and Agreement Abstractions in the Presence of Byzantine Processes

... paper: Byzantine-tolerant agreement abstraction The most important agreement abstraction en- countered in distributed systems prone to process failures is consensus ([3, 8, 18, 27], to cite only ... Voir le document complet

25

Simultaneous Consensus vs Set Agreement a Message-Passing Sensitive Hierarchy of Agreement Problems

Simultaneous Consensus vs Set Agreement a Message-Passing Sensitive Hierarchy of Agreement Problems

... associated with k-set agreement is the impossibility to solve it in presence of both asynchrony and process crashes when t ≥ k [4, 14, ...system with a failure detector [7, ...processes with ... Voir le document complet

15

Liste des papyrus édités de l’Aphrodité byzantine

Liste des papyrus édités de l’Aphrodité byzantine

... n’a pas été possible car elle aurait considérablement alourdi cette annexe et l’aurait fait dévier de son objectif premier. Elle implique d’autre part un travail de révision global – entreprise de longue haleine, qui ... Voir le document complet

38

Time-Free Authenticated Byzantine Consensus

Time-Free Authenticated Byzantine Consensus

... B. A Time-Free Assumption Query-Response Mechanism: In this paper, we con- sider that each process is provided with a query-response mechanism. More specifically, any process p can broadcast a QUERY() message and ... Voir le document complet

8

Agreement as a fallible operation

Agreement as a fallible operation

... languages with an ergative-absolutive agreement alignment but a nominative-accusative case alignment; see ...interact with ϕ-probing is because the way case-discrimination is implemented in the ... Voir le document complet

207

La médecine byzantine à la croisée de l'Orient et de l'Occident

La médecine byzantine à la croisée de l'Orient et de l'Occident

... . Ainsi, l’échange se fait dans les deux sens. 23";<).01%.")>?'1.%/"" Le grand mouvement de traduction de textes médicaux arabes contribue à l’intégration de la médecine orientale à la médecine ... Voir le document complet

12

Carpiniana: a virtualized byzantine crypt

Carpiniana: a virtualized byzantine crypt

... image is similar to images of the same period, present in Constantinople and in Cappadocia (Turkey). Mostly experts of the Byzantine period come from around the world to visit and study this site. During the ... Voir le document complet

7

Key Agreement Against Quantum Adversaries

Key Agreement Against Quantum Adversaries

... For centuries, people have solved this problem using the key predistribution paradigm requiring that (1) the channel is authenticated, meaning that legitimate parties are sure they are talking to each other; and (2) ... Voir le document complet

132

Show all 10000 documents...