Active Bibliography

312 Practical Byzantine fault tolerance and proactive recovery – Miguel Castro, Barbara Liskov - 2002
25 Authenticated Byzantine Fault Tolerance without Public-Key Cryptography – Miguel Castro, Barbara Liskov - 1999
544 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
67 Secure and efficient asynchronous broadcast protocols (Extended Abstract) – Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup - 2001
38 Rosebud: A Scalable Byzantine-Fault-Tolerant Storage Architecture – Rodrigo Rodrigues, Barbara Liskov - 2003
14 Developing a heterogeneous intrusion tolerant CORBA system – David Sames, Brian Matt, Brian Niebuhr, Tally Brent - 2002
Intrusion Tolerant Distributed Object Systems – David Sames, Brian Matt, Brian Niebuhr, Tally Brent, David Bakken
Speculative Execution Across Layers – Benjamin J. Wester - 2012
7 Tolerating latency in replicated state machines through client speculation – Benjamin Wester, Peter M. Chen, James Cowling, Jason Flinn, Edmund B. Nightingale, Barbara Liskov
131 Separating agreement from execution for byzantine fault tolerant services – Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Mike Dahlin - 2003
14 Intrusion-Tolerant Enclaves – Bruno Dutertre, Valentin Crettaz, Victoria Stavridou, Bruno Dutertre Valentin Crettaz - 2002
128 Proactive Recovery in a Byzantine-Fault-Tolerant System – Miguel Castro, Barbara Liskov - 2000
2 Combining Abstraction with Byzantine Fault-Tolerance – Rodrigo Rodrigues - 2001
Education – Wyatt Lloyd, Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen, Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen, Wyatt Lloyd, Michael J. Freedman, Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman - 2012
4 Prophecy: Using History for High-Throughput Fault Tolerance – Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman - 2010
2 Using a Byzantine-Fault-Tolerant Algorithm to Provide a Secure DNS – Zheng Yang - 1995
9 ZZ and the Art of Practical BFT Execution – Timothy Wood, Rahul Singh, Arun Venkataramani, Prashant Shenoy, Emmanuel Cecchet - 2011
8 A Group Membership Protocol For An Intrusion-Tolerant Group Communication System – Harigovind Venkatraj Ramasamy - 2002
1 Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks,” Dependable Network Computing and Mobile Systems Wksp., accepted for publication – Jonathan Kirsch, Brian Coan - 2009