Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Best effort broadcast under cascading failures in interdependent critical infrastructure networks., , , and . Pervasive Mob. Comput., (2018)A Framework for Evaluating BFT., , , , , , and . ICPADS, page 193-200. IEEE, (2021)BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication., , and . IEEE Trans. Inf. Forensics Secur., (2024)Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions., , , and . IACR Cryptol. ePrint Arch., (2022)BG: A Modular Treatment of BFT Consensus., , and . IACR Cryptol. ePrint Arch., (2022)Signature-Free Atomic Broadcast with Optimal O(n2) Messages and O(1) Expected Time., and . IACR Cryptol. ePrint Arch., (2023)Practical State Machine Replication with Confidentiality., and . SRDS, page 187-196. IEEE Computer Society, (2016)A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary., , and . NCA, page 1-10. IEEE, (2018)Best Effort Broadcast under Cascading Failures in Interdependent Networks., , , and . ICDCN, page 27. ACM, (2017)Utilizing semantic big data for realizing a national-scale infrastructure vulnerability analysis system., , , and . SBD@SIGMOD, page 3. ACM, (2016)