The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2005 vol. 3)
ISSN: 1540-7993
pp: 34-43
Fred B. Schneider , Cornell University
Lidong Zhou , Microsoft Research Silicon Valley
A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey that landscape.
cryptography, trusted systems, state machines

F. B. Schneider and L. Zhou, "Implementing Trustworthy Services Using Replicated State Machines," in IEEE Security & Privacy, vol. 3, no. , pp. 34-43, 2005.
85 ms
(Ver 3.3 (11022016))