Logo des Repositoriums
 

Transformations in secure and fault-tolerant distributed computation

dc.contributor.authorFreiling, Felix C.
dc.contributor.authorMittal, Neeraj
dc.contributor.authorPenso, Lucia Draque
dc.contributor.editorCremers, Armin B.
dc.contributor.editorManthey, Rainer
dc.contributor.editorMartini, Peter
dc.contributor.editorSteinhage, Volker
dc.date.accessioned2019-10-11T07:41:28Z
dc.date.available2019-10-11T07:41:28Z
dc.date.issued2005
dc.description.abstractWe present a survey of different techniques used by the authors to transform a security or fault-tolerance problem into another with a known solution. We consider the following two cases: (1) reducing a security problem into a fault-tolerance problem; (2) reducing a fault-tolerant problem into its fault-intolerant version. In these cases it is possible to reuse known solutions to construct new efficient algorithms.en
dc.identifier.isbn3-88579-396-2
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/28071
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofInformatk 2005. Informatik Live! Band 1
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-67
dc.titleTransformations in secure and fault-tolerant distributed computationen
dc.typeText/Conference Paper
gi.citation.endPage412
gi.citation.publisherPlaceBonn
gi.citation.startPage410
gi.conference.date19.-22. September 2005
gi.conference.locationBonn
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings.67-92.pdf
Größe:
137.41 KB
Format:
Adobe Portable Document Format