119 Hits in 1.2 sec

BFT Protocol Forensics [article]

Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2021 arXiv   pre-print
Focusing on popular BFT protocols (PBFT, HotStuff, Algorand) we exactly characterize their forensic support, showing that there exist minor variants of each protocol for which the forensic supports vary  ...  Finally, we show that all secure BFT protocols designed for 2t+1 replicas communicating over a synchronous network forensic support are inherently nonexistent; this impossibility result holds for all BFT  ...  We analyze the forensic support of classical and state-of-the-art BFT protocols for Byzantine Agreement.  ... 
arXiv:2010.06785v4 fatcat:h3bvbnvszjf7xavf5uo4jgwo6i

Accountability and Forensics in Blockchains: XDC Consensus Engine DPoS 2.0 [article]

Gerui Wang, Jerome Wang, Liam Lai, Fisher Yu
2021 arXiv   pre-print
Built upon the most advanced BFT consensus protocol, this upgrade will empower the XDC Network with military-grade security and performance while consuming extremely low resources, and will be fully backwards-compatible  ...  The core invention is the holistic integration of accountability and forensics in blockchains: the ability to identify malicious actors with cryptographic integrity directly from the blockchain records  ...  as BFT (Byzantine Fault Tolerant) protocols [8] in Computer Science.  ... 
arXiv:2108.01420v3 fatcat:hnfpotqm2bbe7hxfahxwsimkdq

CICM: A Collaborative Integrity Checking Blockchain Consensus Mechanism for Preserving the Originality of Data the Cloud for Forensic Investigation

Omoniyi Salami, Muhammad Bashir Abdulrazaq, Emmanuel Adewale Adedokun, Basira Yahaya
2022 Kinetik  
Specially designed foolproof protection for data integrity is required for forensic purposes.  ...  The originality of data is very important for achieving correct results from forensic analysis of data for resolving the issue.  ...  Zyzzyva [13] is another consensus protocol that uses speculation to improve the cost of replication better than it was in the classical BFT mechanism. It was developed upon PBFT protocol.  ... 
doi:10.22219/kinetik.v7i1.1378 fatcat:6vhl2kfpebfwvomhtuhcb5jk2m

Forensic Anthropology and the Most Probable Cause of Death in Cases of Violations Against International Humanitarian Law: An Example from Bosnia and Herzegovina

Jose Pablo Baraybar, Marek Gasior
2006 Journal of Forensic Sciences  
This study presents an example of the multidisciplinary approach to the effective forensic investigation of violation against International Humanitarian Law, as well as an example of how it is possible  ...  The following study discusses the anthropological protocol used in these types of investigations, taphonomic and demographic results of this investigation, and analysis of skeletal trauma.  ...  All injuries classified as BFT were assumed to have occurred postmortem except where the BFT could be demonstrated to have occurred prior to a GSW (i.e., a fracture line that occurred prior to those originating  ... 
doi:10.1111/j.1556-4029.2005.00035.x pmid:16423232 fatcat:54bapq4cwbdmxmljh3hymx4cja

Suitability of 3D printing cranial trauma: prospective novel applications and limitations of 3D replicas

Rachael M Carew, James French, Ruth M Morgan
2021 Forensic Science International: Reports  
A total of 16 measurements were taken twice each by two observers, in a similar manner to the protocol outlined by Carew et al. [22] .  ...  BFT is the most common form of injury examined by forensic practitioners [8, 9] and can generally be identified by the presence of an impact area, combined with (some or all of) radiating and concentric  ... 
doi:10.1016/j.fsir.2021.100218 fatcat:63vkqi5tvbasbcncd5kpfghzaa

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets [article]

Joachim Neu, Ertem Nusret Tas, David Tse
2022 arXiv   pre-print
Our accountability gadget construction is black-box and can use any BFT protocol which is accountable under static participation.  ...  For applications of Byzantine fault tolerant (BFT) consensus protocols where the participants are economic agents, recent works highlighted the importance of accountability: the ability to identify participants  ...  Sheng, P., Wang, G., Nayak, K., Kannan, S., Viswanath, P.: BFT protocol forensics. In: CCS. pp. 1722-1743. ACM (2021) 40.  ... 
arXiv:2105.06075v3 fatcat:chu2nf6ei5hu7ncpgl5fjgbmz4

Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication [article]

Zhuolun Xiang, Dahlia Malkhi, Kartik Nayak, Ling Ren
2021 arXiv   pre-print
Compared to the prior best solution Flexible BFT which requires quadratic message complexity, our solution maintains the linear message complexity of state-of-the-art BFT SMR protocols and requires only  ...  Byzantine fault tolerant (BFT) state machine replication (SMR) is an important building block for constructing permissioned blockchain systems.  ...  Bft protocol forensics, 2020. [42] Nibesh Shrestha, Ittai Abraham, Ling Ren, and Kartik Nayak. On the optimality of optimistic responsiveness.  ... 
arXiv:2101.03715v1 fatcat:5ettoze2avdnbcyd47ttjgjgfi

Application of Blockchain Technology in Intellectual Property Protection

Liya Luo, Vijay Kumar
2022 Mathematical Problems in Engineering  
Furthermore, the industry has proposed the BFT enhancement algorithms such as scalable BFT [25] , parallel BFT [26] , optimistic BFT [27] , and so on. e Ripple payment network proposes the Ripple protocol  ...  HoneyBadgerBFT is the first practical asynchronous BFT protocol that does not rely on any time assumption to guarantee network effectiveness and is fault tolerant even in wide area networks where network  ... 
doi:10.1155/2022/4641559 fatcat:5gz7j67y5ne65dfbywn3zjya7u

Discovering Database Replication Techniques in RDBMS

Anees Hussain, M. N. A. Khan
2014 International Journal of Database Theory and Application  
Digital forensics also requires support for databases which need to be replicated for data integrity.  ...  Rafique and Khan [17] explored various methods, practices and tools being used for static and live digital forensics.  ... 
doi:10.14257/ijdta.2014.7.1.09 fatcat:erk5uhlknfgd3nys6awgrqc24a

The possibility of establishing causes of death on the basis of the exhumed remains of prisoners executed during the communist regime in Poland: the exhumations at Powązki Military Cemetery in Warsaw

Łukasz Szleszkowski, Agata Thannhäuser, Krzysztof Szwagrzyk, Tomasz Jurek
2014 International journal of legal medicine (Print)  
Forensic medical research focussed on determining causes of death and reconstructing the mechanisms of injury leading to death.  ...  This study presents the results of the analysis of forensic examinations of the remains of 194 prisoners exhumed at Powązki Military Cemetery in Warsaw.  ...  In one case only, it was found that the most probable cause of death was blunt force trauma (BFT) to the head.  ... 
doi:10.1007/s00414-014-1084-z pmid:25227925 pmcid:PMC4475244 fatcat:mobakosjkfanvgpkvxcvg63hnu

Front Matter, Table of Contents, Preface, Conference Organization

Vincent Danos, Maurice Herlihy, Maria Potop-Butucaru, Julien Prat, Sara Tucci-Piergiovanni, Sara Tucci-Piergiovanni, Vincent Danos, Maurice Herlihy, Maria Potop-Butucaru, Julien Prat
2020 International Conference on Blockchain Economics, Security and Protocols  
Flexible BFT: Separating BFT Protocol Design from the Fault Model Dahlia Malkhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Grunspan and Ricardo Pérez-Marco . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11:1-11:10 B-CoC: A Blockchain-Based Chain of Custody for Evidences Management in Digital Forensics  ... 
doi:10.4230/oasics.tokenomics.2019.0 dblp:conf/tokenomics/X19 fatcat:fmphupwbffah3hxjk4y5gyzb3i

Online Signature Verification: To What Extent Should a Classifier be Trusted in?

Marianela Parodi, Juan C. Gómez
2017 CLEI Electronic Journal  
., an automatically selected feature set, a feature set relevant to Forensic Handwriting Experts (FHEs), and a global feature set.  ...  The score level fusion is performed within the framework of the Belief Function Theory (BFT), in order to address the problem of the conflicting results appearing when multiple classifiers are being used  ...  Workshop on Automated Forensic Handwriting Analysis  ... 
doi:10.19153/cleiej.20.2.5 fatcat:6vxaql2om5eefi423k3lcn7eay

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles
2021 Computer Networks  
If the underlying consensus protocols performance and fault tolerance is also considered, then only a small number of platforms meet the requirements of our reference IoT domain.  ...  In the Byzantine fault tolerant (BFT) consensus protocols family, the most common protocol is the Practical Byzantine Fault Tolerant PBFT [41] , which can be displayed as a blossom of the VSR/Paxos [  ...  : 3f + 1 Low˘6 00 4.5sec 53% Besu 350 * 400 2sec 52% Aura Parity BFT: 2f + 1 High 35 -45 5sec 65% BFT-SMaRt Fabric BFT: 3f + 1 High > 10K 0.5sec 87% Symbiont 80K < 1sec 86%  ... 
doi:10.1016/j.comnet.2021.108005 fatcat:35tosxqpxjawzilnxoco5u2b5q

Basilic: Resilient Optimal Consensus Protocols With Benign and Deceitful Faults [article]

Alejandro Ranchal-Pedrosa, Vincent Gramoli
2022 arXiv   pre-print
These protocols differ in the number of processes from which they wait to receive messages before progressing.  ...  Each of these protocols is thus better suited for some applications depending on the predominance of benign or deceitful faults.  ...  Note that other optimizations present in other works, such as the possibility to obtain an amortized complexity of O(λ\ ∈ ) in BFT Forensics per decision after n iterations of the protocol [43] , is also  ... 
arXiv:2204.08670v1 fatcat:p6hvapyv6zcztett4pfacknxhy

Spatial dynamics and mixing of bluefin tuna in the Atlantic Ocean and Mediterranean Sea revealed using next-generation sequencing

Gregory N. Puncher, Alessia Cariani, Gregory E. Maes, Jeroen Van Houdt, Koen Herten, Rita Cannas, Naiara Rodriguez-Ezpeleta, Aitor Albaina, Andone Estonba, Molly Lutcavage, Alex Hanke, Jay Rooker (+19 others)
2018 Molecular Ecology Resources  
Genomic DNA was extracted from all tissue and purified using Promega's Wizard®SV96 Genomic DNA Purification kit and vacuum manifold following the manufacturer's protocols.  ...  Finally, the various resources that we have developed can be used for seafood traceability and fisheries forensics applications (Bernatchez et al. 2017) .  ... 
doi:10.1111/1755-0998.12764 pmid:29405659 fatcat:vtfixq37afevvmxkqirqicfz6i
« Previous Showing results 1 — 15 out of 119 results