Author of the publication

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.

, , , , and . PRDC, page 357-364. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomization Can Be a Healer: Consensus with Dynamic Omission Failures., , , and . DISC, volume 5805 of Lecture Notes in Computer Science, page 63-77. Springer, (2009)Turquois: Byzantine consensus in wireless ad hoc networks., , and . DSN, page 537-546. IEEE Computer Society, (2010)When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus., , , , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 480-481. Springer, (2007)RITAS: Services for Randomized Intrusion Tolerance., , , and . IEEE Trans. Dependable Secur. Comput., 8 (1): 122-136 (2011)The Istanbul BFT Consensus Algorithm.. CoRR, (2020)Randomization can be a healer: consensus with dynamic omission failures., , , and . Distributed Comput., 24 (3-4): 165-175 (2011)Achieving Low Latency Transactions for Geo-replicated Storage with Blotter., , , , , and . Encyclopedia of Big Data Technologies, Springer, (2019)Blotter: Low Latency Transactions for Geo-Replicated Storage., , , , , and . WWW, page 263-272. ACM, (2017)Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols., , , and . SRDS, page 235-244. IEEE Computer Society, (2006)Randomized Intrusion-Tolerant Asynchronous Services., , , and . DSN, page 568-577. IEEE Computer Society, (2006)