Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Lyu H, Xie S, Niu J and Feng C. (2025). Byzantine Protocols with Asymptotically Optimal Communication Complexity. Security and Privacy in Communication Networks. 10.1007/978-3-031-64948-6_13. (247-264).

    https://link.springer.com/10.1007/978-3-031-64948-6_13

  • Vonlanthen Y, Sliwinski J, Albarello M and Wattenhofer R. Banyan: Fast Rotating Leader BFT. Proceedings of the 25th International Middleware Conference. (494-507).

    https://doi.org/10.1145/3652892.3700788

  • Giridharan N, Suri-Payer F, Abraham I, Alvisi L and Crooks N. Autobahn: Seamless high speed BFT. Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles. (1-23).

    https://doi.org/10.1145/3694715.3695942

  • Kavousi A, Wang Z and Jovanovic P. (2024). SoK: Public Randomness 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P). 10.1109/EuroSP60621.2024.00020. 979-8-3503-5425-6. (216-234).

    https://ieeexplore.ieee.org/document/10629002/

  • Du Z, Zhang W, Liu L and Fu Y. (2024). Cross shard leader accountability protocol based on two phase atomic commit. Scientific Reports. 10.1038/s41598-024-64945-1. 14:1.

    https://www.nature.com/articles/s41598-024-64945-1

  • Doidge I, Ramesh R, Shrestha N and Tobkin J. (2024). Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 10.1109/DSN58291.2024.00052. 979-8-3503-4105-8. (470-482).

    https://ieeexplore.ieee.org/document/10646973/

  • Amiri M, Agrawal D, El Abbadi A and Loo B. Distributed Transaction Processing in Untrusted Environments. Companion of the 2024 International Conference on Management of Data. (570-579).

    https://doi.org/10.1145/3626246.3654684

  • Bravo M, Chockler G and Gotsman A. (2024). Liveness and latency of Byzantine state-machine replication. Distributed Computing. 37:2. (177-205). Online publication date: 1-Jun-2024.

    https://doi.org/10.1007/s00446-024-00466-4

  • Albouy T, Frey D, Raynal M and Taïani F. (2024). Good-case early-stopping latency of synchronous byzantine reliable broadcast: the deterministic case. Distributed Computing. 37:2. (121-143). Online publication date: 1-Jun-2024.

    https://doi.org/10.1007/s00446-024-00464-6

  • Luo Z, Bhat A, Nayak K and Kate A. (2024). Attacking and Improving the Tor Directory Protocol 2024 IEEE Symposium on Security and Privacy (SP). 10.1109/SP54263.2024.00083. 979-8-3503-3130-1. (3221-3237).

    https://ieeexplore.ieee.org/document/10646693/

  • Datta A, Reijsbergen D, Zhang J and Majumder S. BlockChain I/O: Enabling Cross-Chain Commerce. IEEE Access. 10.1109/ACCESS.2024.3421527. 12. (90915-90928).

    https://ieeexplore.ieee.org/document/10579812/

  • Zhang H, Xie T, Chan W, Guo H and Gai K. (2023). Time-Aware Relay Chain-Based Committee Consensus for Decentralized Identity 2023 International Conference on High Performance Big Data and Intelligent Systems (HDIS). 10.1109/HDIS60872.2023.10499570. 979-8-3503-9416-0. (8-15).

    https://ieeexplore.ieee.org/document/10499570/

  • Bhat A, Bandarupalli A, Nagaraj M, Bagchi S, Kate A and Reiter M. EESMR. Proceedings of the 24th International Middleware Conference. (1-14).

    https://doi.org/10.1145/3590140.3592848

  • Blum E, Katz J, Loss J, Nayak K and Ochsenreither S. Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (519-533).

    https://doi.org/10.1145/3576915.3623191

  • Malkhi D, Momose A and Ren L. Towards Practical Sleepy BFT. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (490-503).

    https://doi.org/10.1145/3576915.3623073

  • Tonkikh A, Ponomarev P, Kuznetsov P and Pignolet Y. CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (1556-1570).

    https://doi.org/10.1145/3576915.3616587

  • Hu K, Zhang Z, Guo K, Jiang W, Li X and Han J. (2023). An optimisation for a two‐round good‐case latency protocol. IET Information Security. 17:4. (664-680). Online publication date: 24-Jul-2023.

    https://doi.org/10.1049/ise2.12123

  • Ranchal-Pedrosa A and Gramoli V. (2023). Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults 2023 IEEE 36th Computer Security Foundations Symposium (CSF). 10.1109/CSF57540.2023.00002. 979-8-3503-2192-0. (91-106).

    https://ieeexplore.ieee.org/document/10221875/

  • Tennenhouse I and Raviv N. (2023). Transaction Confirmation in Coded Blockchain 2023 IEEE International Symposium on Information Theory (ISIT). 10.1109/ISIT54713.2023.10206728. 978-1-6654-7554-9. (1735-1740).

    https://ieeexplore.ieee.org/document/10206728/

  • Hou R and Yu H. (2023). Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains 2023 IEEE Symposium on Security and Privacy (SP). 10.1109/SP46215.2023.10179323. 978-1-6654-9336-9. (2481-2498).

    https://ieeexplore.ieee.org/document/10179323/

  • Zarbafian P and Gramoli V. (2023). Lyra: Fast and Scalable Resilience to Reordering Attacks in Blockchains 2023 IEEE International Parallel and Distributed Processing Symposium (IPDPS). 10.1109/IPDPS54959.2023.00097. 979-8-3503-3766-2. (929-939).

    https://ieeexplore.ieee.org/document/10177428/

  • Bhat A, Bandarupalli A, Bagchi S, Kate A and K. Reiter M. The Unique Chain Rule and Its Applications. Financial Cryptography and Data Security. (38-55).

    https://doi.org/10.1007/978-3-031-47754-6_3

  • Huang M, Han R, Du Z, Fu Y and Liu L. (2022). Reputation-based state machine replication 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA). 10.1109/NCA57778.2022.10013518. 979-8-3503-9730-7. (225-234).

    https://ieeexplore.ieee.org/document/10013518/

  • Hu K, Guo K, Tang Q, Zhang Z, Cheng H and Zhao Z. (2022). Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS54860.2022.00024. 978-1-6654-7177-0. (157-167).

    https://ieeexplore.ieee.org/document/9912165/

  • Bhat A, Shrestha N, Luo Z, Kate A and Nayak K. RandPiper – Reconfiguration-Friendly Random Beacons with Quadratic Communication. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. (3502-3524).

    https://doi.org/10.1145/3460120.3484574

  • Shan C, Fan L and Chen Y. (2021). Lodestone. Security and Communication Networks. 2021. Online publication date: 1-Jan-2021.

    https://doi.org/10.1155/2021/2507670