Byzantine-tolerant protocols are currently being used as building blocks in the construction of secure applications, therefore their performance has a practical impact. Work in message-passing distributed protocols typically considers a set of nodes interconnected by a network. This paper investigates the benefits for the performance of Byzantine-tolerant protocols of including a secure component in the nodes. We have been exploring this kind of hybrid fault models by calling these subsystems wormholes. The present paper follows this line but considers local wormholes, while in previous work wormholes were distributed, i.e., they included their own communication channel. The paper presents the architecture of systems with local wormholes an...
The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrain...
AbstractWith the evolution of new technologies, the growing reliance on networks has increased immen...
Thanks to the latest evolutions in hardware and networking technologies we live in a world where net...
Byzantine-tolerant protocols are currently being used as building blocks in the construction of secu...
The application of the tolerance paradigm to security intrusion tolerance has been raising a good de...
Achieving consensus in a network is one of the most important performance bottlenecks in distributed...
Adversary structures are a generalization of the classical "at most t-out-of-n" threshold ...
This paper describes an architecture for secure and fault-tolerant service replication in an asynchr...
This paper investigates several voting consensus protocols with low computational complexity in nois...
Given the growing reliance of industry and government on online information services such as cloud c...
This paper studies the consensus problem in byzantine asynchronous distributed systems. In such syst...
We consider the problem of reliably broadcasting information in a multihop asyn-chronous network tha...
We present an optimal emulation of a server based regular read/write storage in a synchronous round-...
International audienceWe consider the problem of reliably broadcasting information in a multi hop as...
Consider a distributed system that delivers each message from a process to its destination if the me...
The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrain...
AbstractWith the evolution of new technologies, the growing reliance on networks has increased immen...
Thanks to the latest evolutions in hardware and networking technologies we live in a world where net...
Byzantine-tolerant protocols are currently being used as building blocks in the construction of secu...
The application of the tolerance paradigm to security intrusion tolerance has been raising a good de...
Achieving consensus in a network is one of the most important performance bottlenecks in distributed...
Adversary structures are a generalization of the classical "at most t-out-of-n" threshold ...
This paper describes an architecture for secure and fault-tolerant service replication in an asynchr...
This paper investigates several voting consensus protocols with low computational complexity in nois...
Given the growing reliance of industry and government on online information services such as cloud c...
This paper studies the consensus problem in byzantine asynchronous distributed systems. In such syst...
We consider the problem of reliably broadcasting information in a multihop asyn-chronous network tha...
We present an optimal emulation of a server based regular read/write storage in a synchronous round-...
International audienceWe consider the problem of reliably broadcasting information in a multi hop as...
Consider a distributed system that delivers each message from a process to its destination if the me...
The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrain...
AbstractWith the evolution of new technologies, the growing reliance on networks has increased immen...
Thanks to the latest evolutions in hardware and networking technologies we live in a world where net...