In: 13th IEEE International Conference on Peer-to-Peer Computing (P2P), Trentoĭouceur JJ (2002) The sybil attack. Springer, Berlin/Heidelberg, pp 337–340ĭecker C, Wattenhofer R (2013) Information propagation in the bitcoin network. USENIX Association, pp 153–168ĭe Moura L, Bjørner N (2008) Z3: an efficient SMT solver. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI. Ĭlement A, Wong E, Alvisi L, Dahlin M, Marchetti M (2009b) Making byzantine fault tolerant systems tolerate byzantine faults. ![]() In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP. USENIX Association, pp 173–186Ĭlement A, Kapritsos M, Lee S, Wang Y, Alvisi L, Dahlin M, Riche T (2009a) Upright cluster services. In: Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI’99, Berkeley. CoRR abs/1707.01873Ĭastro M, Liskov B (1999) Practical byzantine fault tolerance. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, DCCL 2016Ĭachin C, Vukolic M (2017) Blockchain Consensus Protocols in the Wild. IEEE Computer Society, pp 104–121īuterin V, Griffith V (2017) Casper the Friendly Finality Gadget. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy, Washington, SP’15. In: DSNīonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) SoK: research perspectives and challenges for bitcoin and cryptocurrencies. CoRR abs/cs/0603118,, cs/0603118īessani A, Sousa J, Alchieri EEP (2014) State machine replication for the masses with bft-smart. Springer, Berlin/Heidelberg, pp 142–157īertot Y (2006) Coq in a Hurry. In: Clark J, Meiklejohn S, Ryan PY, Wallach D, Brenner M, Rohloff K (eds) Financial cryptography and data security. ![]() The MIT Pressīentov I, Gabizon A, Mizrahi A (2016) Cryptocurrencies without proof of work. IEEE Computer Society, pp 297–306īaier C, Katoen JP (2008) Principles of model checking (Representation and mind series). ![]() In: Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS’13. Springer International Publishing, pp 538–557Īublin PL, Mokhtar SB, Quéma V (2013) RBFT: Redundant Byzantine Fault Tolerance. In: Abdalla M, De Prisco R (eds) Security and cryptography for networks. CoRR abs/1801.10228, Īteniese G, Bonacina I, Faonio A, Galesi N (2014) Proofs of space: when space is of the essence. Īndroulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, Caro AD, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolic M, Cocco SW, Yellick J (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. Abraham I, Gueta G, Malkhi D, Alvisi L, Kotla R, Martin J (2017) Revisiting fast practical byzantine fault tolerance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |