The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2005 vol.3)
pp: 34-43
Fred B. Schneider , Cornell University
Lidong Zhou , Microsoft Research Silicon Valley
ABSTRACT
A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey that landscape.
INDEX TERMS
cryptography, trusted systems, state machines
CITATION
Fred B. Schneider, Lidong Zhou, "Implementing Trustworthy Services Using Replicated State Machines", IEEE Security & Privacy, vol.3, no. 5, pp. 34-43, September/October 2005, doi:10.1109/MSP.2005.125
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool