Papers I am reading
Suggest me a paper by opening an issue
- CS proofs, Micali, Silvio, 1994
- Rational proofs, Azar, Pablo Daniel and Micali, Silvio, 2012
- There is more consensus in egalitarian parliaments, 2013
- Paxos made moderately complex, 2015
- Rational sumchecks, 2016
- On the Cost of Authenticated Data Structures, Triandopoulos, RTN, 2003
- Trusty URIs: Verifiable, immutable, and permanent digital artifacts for linked data, Kuhn, Tobias and Dumontier, Michel, 2014
- Making digital artifacts on the web verifiable and reliable, 2015
- Authenticating Web content with prooflets, 2002
- Verena : End-to-End Integrity Protection for Web Applications, 2016
- Publishing without publishers: a decentralized approach to dissemination, retrieval, and archiving of data, 2015
- Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing, 2016
- Balloon: {A} Forward-Secure Append-Only Persistent Authenticated Data Structure, 2015
- A Conflict-Free Replicated JSON Datatype, Kleppmann, Martin and Beresford, Alastair R, 2016
- PAG: Private and Accountable Gossip, Decouchant, J{'e}r{'e}mie and Ben Mokhtar, Sonia and Qu{'e}ma, Vivien, 2016
- Efficient Data Structures for Tamper-Evident Logging, Crosby, Scott and Wallach, Dan, 2009
- Tendermint: Byzantine Fault Tolerance in the Age of Blockchains, 2016
- Inclusive Block Chain Protocols, Yoad Lewenberg and Yonatan Sompolinsky and Aviv Zohar, 2015
- Rethinking State-Machine Replication for Parallelism, Parisa Jalili Mar et al., 2014
- Authenticated data structures, generically, Andrew Miller et al., 2014
- The Honey Badger of {BFT} Protocols, Andrew Miller et al., 2016
- Authenticated Data Structures, Roberto Tamassia, 2003
- A Critical Look at Decentralized Personal Data Architectures, Arvind Narayanan et al., 2012
- The Next 700 {BFT} Protocols, 2015
- State Machine Replication for the Masses with {BFT-SMART}, 2014
- Consensus in a Box: Inexpensive Coordination in Hardware, 2016
- Scalability! But at what COST?, 2015
- Practical Byzantine Fault Tolerance, Miguel Castro and Barbara Liskov, 1999
- Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds, Frank Wang et al., 2016
- Separating Web Applications from User Data Storage with {BSTORE}, Ramesh Ch et al., 2010
- VerSum: Verifiable Computations over Large Public Logs, Jelle van den Hooff and M. Frans Kaashoek and Nickolai Zeldovich, 2014
- Blockstack: Design and Implementation of a Global Naming System with Blockchains, Ali, Muneeb et al., 2016
- Building Web Applications on Top of Encrypted Data Using Mylar, Raluca Ada Popa et al., 2014
- Amber: Decoupling User Data from Web Applications, Tej Chajed et al., 2015
- The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. {BFT} Replication, Marko Vukolic, 2015
- Toward Principled Browser Security, 2013
- Why does cryptographic software fail?: a case study and open problems, 2014
- Enabling Blockchain Innovations with Pegged Sidechains, 2014
- Protecting Users by Confining JavaScript with {COWL}, 2014
- In Search of an Understandable Consensus Algorithm, Diego Ongaro and John K. Ousterhout, 2014
- Dynamo: amazon's highly available key-value store, Giuseppe DeC et al., 2007
- Chord: {A} scalable peer-to-peer lookup service for internet applications, Ion Stoica et al., 2001
- Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System, Douglas B. Terry et al., 1995
- TreadMarks: Distributed Shared Memory on Standard Workstations and Operating Systems, 1994
- Existential consistency: measuring and understanding consistency at Facebook, 2015
- {PNUTS:} Yahoo!'s hosted data serving platform, 2008
- Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services, 2015
- Efficient Optimistic Concurrency Control Using Loosely Synchronized Clocks, 1995
- No compromises: distributed transactions with consistency, availability, and performance, 2015
- Large-scale cluster management at Google with Borg, 2015
- Resilient Distributed Datasets: {A} Fault-Tolerant Abstraction for In-Memory Cluster Computing, 2012
- Bitcoin: A peer-to-peer electronic cash system,” http://bitcoin.org/bitcoin.pdf, 2008
- Pinocchio: Nearly practical verifiable computation, 2013
- Failure Detection and Randomization: {A} Hybrid Approach to Solve Consensus, 1998
- Bitcoin meets strong consistency, 2016
- Impossibility of Distributed Consensus with One Faulty Process, 1985
- Experiences with CoralCDN: {A} Five-Year Operational View, 2010
- Vuvuzela: scalable private messaging resistant to traffic analysis, 2015
- How to Use Bitcoin to Incentivize Correct Computations, 2014
- Secure Untrusted Data Repository {(SUNDR)}, 2004
- Cachet: a decentralized architecture for privacy preserving social networking with caching, 2012
- Extended Functionality in Verifiable Searchable Encryption, 2015
- Practical Robust Communication in DHTs Tolerating a Byzantine Adversary, 2010
- Equihash: Asymmetric proof-of-work based on the generalized birthday problem, 2016
- CONIKS: Bringing Key Transparency to End Users, 2015
- Egalitarian Computing, 2016
- Eventually Returning to Strong Consistency, 2016
- Dynamic Scalable State Machine Replication, 2016
- {Consensus in the Presence of Partial Synchrony}, 1988
- Towards an Internet of Trust, 2015
- {SWIM:} Scalable Weakly-consistent Infection-style Process Group Membership Protocol, 2002
- Bitcoin-NG: {A} Scalable Blockchain Protocol, 2015
- Majority Is Not Enough: Bitcoin Mining Is Vulnerable, 2014
- Eclipse Attacks on Bitcoin's Peer-to-Peer Network, 2015
- Accountable Algorithms, 2016
- The bitcoin lightning network: Scalable off-chain instant payments, 2015
- The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus, 2015