


default search action
25th SSS 2023: Jersey City, NJ, US
- Shlomi Dolev
, Baruch Schieber:
Stabilization, Safety, and Security of Distributed Systems - 25th International Symposium, SSS 2023, Jersey City, NJ, USA, October 2-4, 2023, Proceedings. Lecture Notes in Computer Science 14310, Springer 2023, ISBN 978-3-031-44273-5 - Erwan Jahier, Karine Altisen, Stéphane Devismes:
Exploring Worst Cases of Self-stabilizing Algorithms Using Simulations. 1-17 - Erwan Jahier, Karine Altisen, Stéphane Devismes, Gabriel B. Sant'Anna:
Model Checking of Distributed Algorithms Using Synchronous Programs. 18-35 - Gaetano Coccimiglio, Trevor Brown, Srivatsan Ravi:
The Fence Complexity of Persistent Sets. 36-51 - Winfred Afeaneku, Andrew Berns, Weston Kuchenberg, Sara Leisinger, Cedric Liu:
Brief Announcement: Understanding Self-stabilizing Node-Capacitated Overlay Networks Through Simulation. 52-56 - Anshuman Misra, Ajay D. Kshemkalyani
:
Brief Announcement: Byzantine-Tolerant Detection of Causality in Synchronous Systems. 57-61 - Eli Gafni, Giuliano Losa
:
Invited Paper: Time Is Not a Healer, but It Sure Makes Hindsight 20:20. 62-74 - Saptadi Nugroho
, Alexander Weinmann
, Christian Schindelhauer
:
Adding Pull to Push Sum for Approximate Data Aggregation. 75-89 - Nikolaos D. Kallimanis
, Eleni Kanellou, Charidimos Kiosterakis, Vasiliki Liagkou:
Exploring Trade-Offs in Partial Snapshot Implementations. 90-105 - Gaurav Bhardwaj, Sathya Peri, Pratik Shetty:
Brief Announcement: Non-blocking Dynamic Unbounded Graphs with Wait-Free Snapshot. 106-110 - Anshuman Misra, Ajay D. Kshemkalyani
:
Byzantine Fault-Tolerant Causal Order Satisfying Strong Safety. 111-125 - Vijay K. Garg
, Changyong Hu
:
Improved Paths to Stability for the Stable Marriage Problem. 126-140 - Arya Tanmay Gupta, Sandeep S. Kulkarni:
Lattice Linearity of Multiplication and Modulo. 141-156 - Konstantinos Georgiou, Somnath Kundu, Pawel Pralat:
The Fagnano Triangle Patrolling Problem (Extended Abstract). 157-171 - Ken Birman
, Sagar Jha, Mae Milano
, Lorenzo Rosa
, Weijia Song
, Edward Tremel
:
Invited Paper: Monotonicity and Opportunistically-Batched Actions in Derecho. 172-190 - Vijeth Aradhya
, Seth Gilbert
, Aquinas Hobor:
Robust Overlays Meet Blockchains - On Handling High Churn and Catastrophic Failures. 191-206 - Bogdan S. Chlebus, Dariusz R. Kowalski, Jan Olkowski, Jedrzej Olkowski:
Disconnected Agreement in Networks Prone to Link Failures. 207-222 - Sahiba Suryawanshi, Dhiman Saha:
Where Are the Constants? New Insights on the Role of Round Constant Addition in the SymSum Distinguisher. 223-239 - Gal Morgenstern
, Lital Dabush
, Jip Kim
, James Anderson
, Gil Zussman
, Tirza Routtenberg
:
Invited Paper: Detection of False Data Injection Attacks in Power Systems Using a Secured-Sensors and Graph-Based Method. 240-258 - Ronald Petrlic, Christof Lange:
KerberSSIze Us: Providing Sovereignty to the People. 259-273 - Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth. 274-288 - Devharsh Trivedi
:
Brief Announcement: Efficient Probabilistic Approximations for Sign and Compare. 289-296 - Ryota Eguchi, Fukuhito Ooshita, Michiko Inoue, Sébastien Tixeuil:
Meeting Times of Non-atomic Random Walks. 297-311 - Yuichi Asahiro, Masafumi Yamashita:
Minimum Algorithm Sizes for Self-stabilizing Gathering and Related Problems of Autonomous Mobile Robots (Extended Abstract). 312-327 - Hirokazu Seike, Yukiko Yamauchi:
Separation of Unconscious Colored Robots. 328-343 - Michel Habib, Minh-Hang Nguyen, Mikaël Rabie, Laurent Viennot:
Forbidden Patterns in Temporal Graphs Resulting from Encounters in a Corridor. 344-358 - Bibhuti Das, Krishnendu Mukhopadhyaya:
Uniform k-Circle Formation by Fat Robots. 359-373 - Pritam Goswami
, Avisek Sharma
, Satakshi Ghosh
, Buddhadeb Sau
:
Brief Announcement: Rendezvous on a Known Dynamic Point in a Finite Unoriented Grid. 374-379 - Quentin Bramas, Toshimitsu Masuzawa, Sébastien Tixeuil:
Brief Announcement: Crash-Tolerant Exploration by Energy Sharing Mobile Agents. 380-384 - Serafino Cicerone
, Alessia Di Fonso
, Gabriele Di Stefano
, Alfredo Navarra
:
Time-Optimal Geodesic Mutual Visibility of Robots on Grids Within Minimum Area. 385-399 - Talley Amir
, James Aspnes
:
Privacy in Population Protocols with Probabilistic Scheduling. 400-413 - Debasish Pattanayak
, Gokarna Sharma
, Partha Sarathi Mandal
:
Dispersion of Mobile Robots in Spite of Faults. 414-429 - Satakshi Ghosh
, Avisek Sharma
, Pritam Goswami
, Buddhadeb Sau
:
Brief Announcement: Asynchronous Gathering of Finite Memory Robots on a Circle Under Limited Visibility. 430-434 - Gaurav Bhardwaj, Bapi Chatterjee, Abhay Jain, Sathya Peri:
Wait-Free Updates and Range Search Using Uruv. 435-450 - Quentin Bramas
, Sayaka Kamei
, Anissa Lamani
, Sébastien Tixeuil
:
Stand-Up Indulgent Gathering on Lines. 451-465 - Quentin Bramas, Jean-Romain Luttringer, Sébastien Tixeuil:
Offline Constrained Backward Time Travel Planning. 466-480 - Asif Uz Zaman Asif, Hossein Shirazi, Indrakshi Ray:
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review. 481-497 - Mahmoud Abdelgawad, Indrakshi Ray, Tomas Vasquez:
Workflow Resilience for Mission Critical Systems. 498-512 - Leonid A. Levin
:
Invited Paper: How Do Humans Succeed in Tasks Like Proving Fermat's Theorem or Predicting the Higgs Boson? 513-517 - Chryssis Georgiou, Michel Raynal, Elad Michael Schiller:
Self-stabilizing Byzantine-Tolerant Recycling. 518-535 - Orestis Alpos
, Christian Cachin
:
Do Not Trust in Numbers: Practical Distributed Cryptography with General Trust. 536-551 - Christian Cachin
, David Lehnherr
, Thomas Studer
:
Synergistic Knowledge. 552-567 - Pratima Jana, Ratna Dutta:
Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys. 568-582 - Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya:
Square Attacks on Reduced-Round FEA-1 and FEA-2. 583-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.