Go to:
Logótipo
Você está em: Start > Publications > View > Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication
Map of Premises
Principal
Publication

Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication

Title
Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication
Type
Article in International Scientific Journal
Year
2023
Authors
Freitas, T
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Journal
Title: COMPUTERS & SECURITYImported from Authenticus Search for Journal Publications
Vol. 129
ISSN: 0167-4048
Scientific classification
FOS: Natural sciences > Computer and information sciences
CORDIS: Technological sciences > Engineering > Computer engineering
FOS: Engineering and technology > Electrical engineering, Electronic engineering, Information engineering
Other information
Authenticus ID: P-00Y-3FQ
Abstract (EN): Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct system/application behavior even in the presence of arbitrary faults (i.e., Byzantine faults). Byzantine Fault tolerant State Machine Replication (BFT-SMR) is a known software solution for masking arbitrary faults and malicious attacks (Liu et al., 2020). In this survey, we present and discuss relevant BFT-SMR protocols, focusing on deterministic and probabilistic approaches. The main purpose of this paper is to discuss the characteristics of proposed works for each approach, as well as identify the trade-offs for each different approach.& COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 30
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Skynet: a Cyber-Aware Intrusion Tolerant Overseer (2023)
Article in International Conference Proceedings Book
Freitas, T; Soares, J; Manuel E Correia; Martins, R

Of the same scientific areas

Deterministic Motif Mining in Protein Databases (2009)
Chapter or Part of a Book
Ferreira, PG; Azevedo, PJ
Deep learning for drug response prediction in cancer (2021)
Article in International Scientific Journal
Baptista, D; Ferreira, PG; Rocha, M
SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification Framework (2023)
Article in International Conference Proceedings Book
Shehu, AS; Pinto, A; Manuel E Correia
Spatial Clustering of Molecular Dynamics Trajectories in Protein Unfolding Simulations (2009)
Article in International Conference Proceedings Book
Ferreira, PG; Silva, CG; Azevedo, PJ; Brito, RMM
Skynet: a Cyber-Aware Intrusion Tolerant Overseer (2023)
Article in International Conference Proceedings Book
Freitas, T; Soares, J; Manuel E Correia; Martins, R

Of the same journal

Triple-Similarity Mechanism for alarm management in the cloud (2018)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
IoT security certifications: Challenges and potential approaches (2022)
Article in International Scientific Journal
Cirne, A; Sousa, PR; Resende, JS; antunes, l
Hardening cryptographic operations through the use of secure enclaves (2021)
Article in International Scientific Journal
Brandao, A; Resende, JS; Martins, R
Caller-REP: Detecting unwanted calls with caller social strength (2013)
Article in International Scientific Journal
Azad, MA; Ricardo Morla

See all (6)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-13 at 04:05:54 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book