How to Securely Replicate Services [report]

Michael Reiter, Kenneth Birman
1992 unpublished
We present a method for constructing replicated services that retain their availability and [Computer-Communication
doi:10.21236/ada252952 fatcat:kkfy53r6kvda5howemnngi4twq