The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
Stockmeyer l: Consensus in the presence of partial synchrony Asynchronous consensus and broadcast protocols, Journal of The ACM Journal of the ACM (JACM), vol.32, issue.4, pp.824-840, 1985. ,
Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002. ,
DOI : 10.1145/571637.571640
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6725
Fault-scalable Byzantine fault-tolerant services, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.59-74, 2005. ,
DOI : 10.1145/1095809.1095817
Hq replication: a hybrid quorum protocol for byzantine fault tolerance, OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pp.177-190, 2006. ,
Zyzzyva, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.45-58, 2007. ,
DOI : 10.1145/1323293.1294267
The next 700 bft protocols, EuroSys '10: Proceedings of the 5th European conference on Computer systems, pp.363-376, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00945717
Making byzantine fault tolerant systems tolerate byzantine faults, NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pp.153-168, 2009. ,
BASE, ACM Transactions on Computer Systems, vol.21, issue.3, pp.236-269, 2003. ,
DOI : 10.1145/859716.859718
URL : https://hal.archives-ouvertes.fr/hal-00357946
Proactive obfuscation, ACM Transactions on Computer Systems, vol.28, issue.2, pp.1-4, 2010. ,
DOI : 10.1145/1813654.1813655
Independent faults in the cloud, Proceedings of the 4th International Workshop on Large Scale Distributed Systems and Middleware, LADIS '10, pp.12-17, 2010. ,
DOI : 10.1145/1859184.1859188
An integrated experimental environment for distributed systems and networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.255-270, 2002. ,
DOI : 10.1145/844128.844152
How practical are intrusion-tolerant distributed systems, p.2992, 2006. ,
The next 700 bft protocol, 2008. ,
Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication, 2003. ,
Dissent, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.340-350, 2010. ,
DOI : 10.1145/1866307.1866346