4 Hits in 5.8 sec

Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance [article]

Michael Clear and Constantinos Patsakis and Paul Laird
2014 arXiv   pre-print
Furthermore, we introduce a technique that allows the computational load of both protocols to be reduced at the expense of protection against collusion tolerance.  ...  We prove that both protocols remain secure with this technique, and evaluate its impact on collusion tolerance and the number of rounds supported.  ...  These protocols are widely used for load monitoring of smart meters, privacy-aware participatory sensing, and generally for submitting time series data with privacy.  ... 
arXiv:1402.7118v1 fatcat:zahpok5iozhvfn6b5iypufza3y

Blockchain Consensus Algorithms: A Survey [article]

Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad A. Hoque, Alan Colman
2020 arXiv   pre-print
This article fills this gap by analysing a wide range of consensus algorithms using a comprehensive taxonomy of properties and by examining the implications of different issues still prevalent in consensus  ...  The result of the analysis is presented in tabular formats, which provides a visual illustration of these algorithms in a meaningful way.  ...  A share of the random seed is individually generated by all electors who participate in a multiparty computation protocol.  ... 
arXiv:2001.07091v2 fatcat:fqgrkarfajfsvng676igrpwme4

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
data.  ...  systems with potential countermeasures.  ...  transaction is submitted and when it has been written to the ledger [161] . • Bootstrap Time: The time it takes to load all of the information and data needed to create a block [162] . • Bandwidth Overhead  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju

Improving End-to-End Availability Using Overlay Networks

David G. Andersen
This dissertation explores three systems designed to mask Internet failures, and, through a study of three years of data collected on a 31-site testbed, why these failures happen and how effectively they  ...  routing systems to cope with persistent congestion.  ...  Data Management: The data repository becomes more self-documenting, with clearly defined column names and relationships. Deleting data and adding new data is greatly simplified. 2.  ... 
doi:10.1184/r1/6606386 fatcat:rekenzu7pzhhnoed23qqf5kn24