skip to main content
10.1145/1281100.1281167acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

The coBFIT toolkit

Published: 12 August 2007 Publication History

Abstract

No abstract available.

References

[1]
Cryptlib Toolkit. http://www.cs.auckland.ac.nz/~pgut001/cryptlib/.
[2]
The JGraph Home Page. http://www.jgraph.com/.
[3]
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and Efficient Asynchronous Broadcast Protocols. In Advances in Cryptology: CRYPTO 2001 (J. Kilian, ed.), LNCS-2139, pages 524--541. Springer, 2001.
[4]
R. Friedman and R. van Renesse. Strong and Weak Virtual Synchrony in Horus. In Proceedings of the 15th Symposium on Reliable Distributed Systems, pages 140--149, Oct 1996.
[5]
H. V. Ramasamy. Parsimonious Service Replication for Tolerating Malicious Attacks in Asynchronous Environments. PhD thesis, University of Illinois at Urbana-Champaign, 2005.
[6]
D. Schmidt and S. Huston. C++ Network Programming: Systematic Reuse with ACE and Frameworks. Addison-Wesley Longman, 2003.
[7]
F. B. Schneider. Implementing Fault-Tolerant Services using the State Machine Approach: A Tutorial. ACM Computing Surveys, 22(4):299--319, December 1990.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '07: Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
August 2007
424 pages
ISBN:9781595936165
DOI:10.1145/1281100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. byzantine faults
  2. intrusion tolerance
  3. replication
  4. software toolkit

Qualifiers

  • Article

Conference

PODC07

Acceptance Rates

Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media