Transformations in secure and fault-tolerant distributed computation
dc.contributor.author | Freiling, Felix C. | |
dc.contributor.author | Mittal, Neeraj | |
dc.contributor.author | Penso, Lucia Draque | |
dc.contributor.editor | Cremers, Armin B. | |
dc.contributor.editor | Manthey, Rainer | |
dc.contributor.editor | Martini, Peter | |
dc.contributor.editor | Steinhage, Volker | |
dc.date.accessioned | 2019-10-11T07:41:28Z | |
dc.date.available | 2019-10-11T07:41:28Z | |
dc.date.issued | 2005 | |
dc.description.abstract | We present a survey of different techniques used by the authors to transform a security or fault-tolerance problem into another with a known solution. We consider the following two cases: (1) reducing a security problem into a fault-tolerance problem; (2) reducing a fault-tolerant problem into its fault-intolerant version. In these cases it is possible to reuse known solutions to construct new efficient algorithms. | en |
dc.identifier.isbn | 3-88579-396-2 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/28071 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Informatk 2005. Informatik Live! Band 1 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-67 | |
dc.title | Transformations in secure and fault-tolerant distributed computation | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 412 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 410 | |
gi.conference.date | 19.-22. September 2005 | |
gi.conference.location | Bonn | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- GI-Proceedings.67-92.pdf
- Größe:
- 137.41 KB
- Format:
- Adobe Portable Document Format