Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2023
Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication
Computers and Security (CSEC), Volume 129, Issue Chttps://doi.org/10.1016/j.cose.2023.103200Highlights- Network infrastructures and software systems are vulnerable to failures.
- Service replication is a solution that guarantees the service’s correct execution even in the presence of faults.
- The use of a consensus protocol is necessary ...
Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct system/application behavior even in the presence of arbitrary faults (i.e., Byzantine faults). Byzantine Fault tolerant State Machine Replication (BFT-SMR) is a ...
- articleAugust 1993
Refereed paper: Encryption and error correction codes for reliable file storage
Computers and Security (CSEC), Volume 12, Issue 5Pages 501–510https://doi.org/10.1016/0167-4048(93)90070-LThe application of encryption techniques to provide communications system security has been practised for a long time. More recently, these techniques have been applied to secure data storage systems. The purpose of a secure data storage system is to ...
- articleOctober 1990
Security policy
Computers and Security (CSEC), Volume 9, Issue 7Pages 605–610https://doi.org/10.1016/0167-4048(90)90058-2We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to ...