Author of the publication

BEAT: Asynchronous BFT Made Practical.

, , and . ACM Conference on Computer and Communications Security, page 2028-2041. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature-Free Atomic Broadcast with Optimal O(n2) Messages and O(1) Expected Time., and . IACR Cryptol. ePrint Arch., (2023)Practical State Machine Replication with Confidentiality., and . SRDS, page 187-196. IEEE Computer Society, (2016)A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary., , and . NCA, page 1-10. IEEE, (2018)Best Effort Broadcast under Cascading Failures in Interdependent Networks., , , and . ICDCN, page 27. ACM, (2017)Utilizing semantic big data for realizing a national-scale infrastructure vulnerability analysis system., , , and . SBD@SIGMOD, page 3. ACM, (2016)A Framework for Evaluating BFT., , , , , , and . ICPADS, page 193-200. IEEE, (2021)Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model., , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model., , , , , , , , and . DSN, page 568-581. IEEE, (2023)Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura., , , , and . WWW, page 2076-2086. ACM, (2023)Energy Management Policies in Distributed Residential Energy Systems., and . IDCS, volume 9864 of Lecture Notes in Computer Science, page 121-133. Springer, (2016)