The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2005 vol. 3)
ISSN: 1540-7993
pp: 34-43
Fred B. Schneider , Cornell University
Lidong Zhou , Microsoft Research Silicon Valley
ABSTRACT
A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey that landscape.
INDEX TERMS
cryptography, trusted systems, state machines
CITATION

F. B. Schneider and L. Zhou, "Implementing Trustworthy Services Using Replicated State Machines," in IEEE Security & Privacy, vol. 3, no. , pp. 34-43, 2005.
doi:10.1109/MSP.2005.125
88 ms
(Ver 3.3 (11022016))