期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
CF-BFT:A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication
1
作者 Zhiruo Zhang Feng Wang +2 位作者 Yang Liu Yang Lu Xinlei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第9期3113-3129,共17页
The consensus protocol is one of the core technologies in blockchain,which plays a crucial role in ensuring the block generation rate,consistency,and safety of the blockchain system.Blockchain systems mainly adopt the... The consensus protocol is one of the core technologies in blockchain,which plays a crucial role in ensuring the block generation rate,consistency,and safety of the blockchain system.Blockchain systems mainly adopt the Byzantine Fault Tolerance(BFT)protocol,which often suffers fromslow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus.In this paper,this paper proposes a new dual-mode consensus protocol based on node identity authentication.It divides the consensus process into two subprotocols:Check_BFT and Fast_BFT.In Check_BFT,the replicas authenticate the primary’s identity by monitoring its behaviors.First,assume that the systemis in a pessimistic environment,Check_BFT protocol detects whether the current environment is safe and whether the primary is an honest node;Enter the fast consensus stage after confirming the environmental safety,and implement Fast_BFT protocol.It is assumed that there are 3f+1 nodes in total.If more than 2f+1 nodes identify that the primary is honest,it will enter the Fast_BFT process.In Fast_BFT,the primary is allowed to handle transactions alone,and the replicas can only receive the messages sent by the primary.The experimental results show that the CF-BFT protocol significantly reduces the communication overhead and improves the throughput and scalability of the consensus protocol.Compared with the SAZyzz protocol,the throughput is increased by 3 times in the best case and 60%in the worst case. 展开更多
关键词 Blockchain consensus protocol DUAL-MODE byzantine fault tolerance distributed system
下载PDF
分布式Byzantine容错系统研究进展
2
作者 蔡权伟 林璟锵 荆继武 《网络新媒体技术》 2013年第1期1-7,共7页
由于网络攻击的经济利益驱动和信息系统复杂性的不断增加,网络安全事件和代码缺陷也日益增多,导致信息系统出现各种错误、甚至被攻击者完全控制。Byzantine错误,又称为任意错误,是所有错误中最为严重的一种。分布式Byzantine容错系统由... 由于网络攻击的经济利益驱动和信息系统复杂性的不断增加,网络安全事件和代码缺陷也日益增多,导致信息系统出现各种错误、甚至被攻击者完全控制。Byzantine错误,又称为任意错误,是所有错误中最为严重的一种。分布式Byzantine容错系统由多台独立运行的服务器组成,能够容忍一定数量部件的Byzantine错误,在错误情况下仍然能提供正确服务。本文对现有代表性的Byzantine容错系统进行介绍和总结,讨论了Byzantine容错系统的技术发展。 展开更多
关键词 byzantine错误 STATE MACHINE Replication(SMR)机制 byzantine容错系统
下载PDF
门限Byzantine quorum系统及其在分布式存储中的应用 被引量:6
3
作者 张薇 马建峰 +1 位作者 王良民 郭渊博 《电子学报》 EI CAS CSCD 北大核心 2008年第2期314-319,共6页
针对纠删编码和门限方案在分布式存储中的应用,提出门限Byzantine quorum系统(TBQS)的概念.该系统与数据分离算法相结合,可以构造可靠性较强的存储系统,当故障服务器个数不超过服务器总数的1/4时,利用TBQS设计存储策略可以实现容错和无... 针对纠删编码和门限方案在分布式存储中的应用,提出门限Byzantine quorum系统(TBQS)的概念.该系统与数据分离算法相结合,可以构造可靠性较强的存储系统,当故障服务器个数不超过服务器总数的1/4时,利用TBQS设计存储策略可以实现容错和无间断服务.讨论了TBQS的存在性,构造了两类TBQS并对其效率进行分析,在此基础上设计了基于TBQS的分布式读写协议. 展开更多
关键词 分布式存储 容错 QUORUM系统 byzantine故障
下载PDF
移动自组网中一种基于集群的Byzantine节点检测机制 被引量:1
4
作者 刘洋 俞能海 冯现磊 《电子与信息学报》 EI CSCD 北大核心 2006年第12期2386-2389,共4页
该文主要介绍了移动自组网中一种基于集群方法的Byzantine错误检测机制。并结合CBRP,提出了一种适合移动自组网的内部出错节点清除算法。通过算法分析证明了所提出的算法可以显著减少清除具有Byzantine错误节点时所需的消息数目,降低了... 该文主要介绍了移动自组网中一种基于集群方法的Byzantine错误检测机制。并结合CBRP,提出了一种适合移动自组网的内部出错节点清除算法。通过算法分析证明了所提出的算法可以显著减少清除具有Byzantine错误节点时所需的消息数目,降低了网络负载,有效提高了移动自组网的安全性和可信度。 展开更多
关键词 byzantine将军问题 移动自组网 集群 安全
下载PDF
基于代理的Byzantine一致性协议的研究 被引量:7
5
作者 王天锷 张大方 杨金民 《计算机工程与科学》 CSCD 2005年第4期57-59,共3页
本文在研究了国内外Byzantine协议的基础上提出了一种新的 Byzantine一致性协议,即基于代理的 Byzan tine一致性协议。该协议按照Byzantine容错机制将所有参与运算的进程分成很多小块,每个块设有一个代理。通过代理,块内的进程向其他块... 本文在研究了国内外Byzantine协议的基础上提出了一种新的 Byzantine一致性协议,即基于代理的 Byzan tine一致性协议。该协议按照Byzantine容错机制将所有参与运算的进程分成很多小块,每个块设有一个代理。通过代理,块内的进程向其他块的进程发送运算结果。这样,在进程发生Byzantine错误时可以先在块的内部处理,从而可以有效地减少容错的开销和时延,提高系统的安全性。 展开更多
关键词 byzantine协议 系统模型 一致性协议 进程通信 通信协议 通信网络
下载PDF
Byzantine故障环境下安全群组通信方案
6
作者 吕金娜 张志军 《河南科技学院学报》 2010年第3期110-115,共6页
提出一种Byzantine故障环境下的安全群组通信方案.在安全群组通信的通信安全层中引入Byzantine协议,采用Byzantine机制在组成员间达成一致的意见,从而检测出叛变者.在忠诚的组成员之间进行密钥协商,从而能够保证在组密钥协商之前参与协... 提出一种Byzantine故障环境下的安全群组通信方案.在安全群组通信的通信安全层中引入Byzantine协议,采用Byzantine机制在组成员间达成一致的意见,从而检测出叛变者.在忠诚的组成员之间进行密钥协商,从而能够保证在组密钥协商之前参与协商的群组成员不是叛变者.与以前方案相比,该方案在通信开销与计算开销都有所增加,但是它能够防御内部攻击,提高了安全性及具有容忍入侵性. 展开更多
关键词 byzantine协议 安全群组通信 组密钥协商 内部攻击
下载PDF
T-PBFT: An EigenTrust-Based Practical Byzantine Fault Tolerance Consensus Algorithm 被引量:41
7
作者 Sheng Gao Tianyu Yu +1 位作者 Jianming Zhu Wei Cai 《China Communications》 SCIE CSCD 2019年第12期111-123,共13页
Blockchain with these characteristics of decentralized structure, transparent and credible, time-series and immutability, has been considering as a promising technology. Consensus algorithm as one of the core techniqu... Blockchain with these characteristics of decentralized structure, transparent and credible, time-series and immutability, has been considering as a promising technology. Consensus algorithm as one of the core techniques of blockchain directly affects the scalability of blockchain systems. Existing probabilistic finality blockchain consensus algorithms such as PoW, PoS, suffer from power consumptions and low efficiency;while absolute finality blockchain consensus algorithms such as PBFT, HoneyBadgerBFT, could not meet the scalability requirement in a largescale network. In this paper, we propose a novel optimized practical Byzantine fault tolerance consensus algorithm based on EigenTrust model, namely T-PBFT, which is a multi-stage consensus algorithm. It evaluates node trust by the transactions between nodes so that the high quality of nodes in the network will be selected to construct a consensus group. To reduce the probability of view change, we propose to replace a single primary node with a primary group. By group signature and mutual supervision, we can enhance the robustness of the primary group further. Finally, we analyze T-PBFT and compare it with the other Byzantine fault tolerant consensus algorithms. Theoretical analysis shows that our T-PBFT can optimize the Byzantine fault-tolerant rate,reduce the probability of view change and communication complexity. 展开更多
关键词 blockchain consensus protocol byzantine fault tolerance trust model
下载PDF
基于双边阈值的抗Byzantine攻击协作频谱感知算法(英文)
8
作者 朱翰宬 宋铁成 +2 位作者 吴俊 李茜 胡静 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期439-443,共5页
为了解决5G认知无线网络中的Byzantine攻击,在频谱感知过程中提出了一种双边阈值筛选方案.在每个回合中,从用户首先将感知能量值和检测信噪比提交给融合中心.根据检测信噪比,融合中心对能量值进行归一化.然后,对归一化能量值进行排序并... 为了解决5G认知无线网络中的Byzantine攻击,在频谱感知过程中提出了一种双边阈值筛选方案.在每个回合中,从用户首先将感知能量值和检测信噪比提交给融合中心.根据检测信噪比,融合中心对能量值进行归一化.然后,对归一化能量值进行排序并遍历这些归一化能量值的中点,以最大化从用户的分类准确率.此外,通过引入识别概率和误筛概率,分析了归一化能量值的分布,从而推导了给定误筛概率情况下的恶意用户双边筛选阈值.最后,通过该双边筛选阈值获得恶意用户名单.仿真结果表明:所提方案的主用户正确感知率、虚警和检测概率均要优于当前主流方案. 展开更多
关键词 认知无线电 byzantine攻击 双边阈值 误筛概率 识别概率
下载PDF
Excellent Practical Byzantine Fault Tolerance 被引量:1
9
作者 Huanrong Tang Yaojing Sun Jianquan Ouyang 《Journal of Cyber Security》 2020年第4期167-182,共16页
With the rapid development of blockchain technology,more and more people are paying attention to the consensus mechanism of blockchain.Practical Byzantine Fault Tolerance(PBFT),as the first efficient consensus algorit... With the rapid development of blockchain technology,more and more people are paying attention to the consensus mechanism of blockchain.Practical Byzantine Fault Tolerance(PBFT),as the first efficient consensus algorithm solving the Byzantine Generals Problem,plays an important role.But PBFT also has its problems.First,it runs in a completely closed environment,and any node can't join or exit without rebooting the system.Second,the communication complexity in the network is as high as O(n2),which makes the algorithm only applicable to small-scale networks.For these problems,this paper proposes an Optimized consensus algorithm,Excellent Practical Byzantine Fault Tolerance(EPBFT),in which nodes can dynamically participate in the network by combining a view change protocol with a node's add or quit request.Besides,in each round of consensus,the algorithm will randomly select a coordination node.Through the cooperation of the primary and the coordination node,we reduce the network communication complexity to O(n).Besides,we have added a reputation credit mechanism and a wrong node removal protocol to the algorithm for clearing the faulty nodes in time and improving the robustness of the system.Finally,we design experiments to compare the performance of the PBFT and EPBFT algorithms.Through experimental,we found that compared with the PBFT algorithm,the EPBFT algorithm has a lower delay,communication complexity,better scalability,and more practical. 展开更多
关键词 byzantine fault tolerance distributed consensus PBFT blockchain PBFT optimization
下载PDF
ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING
10
作者 Ji Dongyao Feng Dengguo 《Journal of Electronics(China)》 2006年第1期64-68,共5页
An ([n/3]-1)-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and ... An ([n/3]-1)-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and produces Byzantine agreement within a fixed expected number of computational rounds. The correctness of the protocol is proved in theory. 展开更多
关键词 byzantine协议 信号分配 随机分配 异步网络
下载PDF
Byzantine Robust Federated Learning Scheme Based on Backdoor Triggers
11
作者 Zheng Yang Ke Gu Yiming Zuo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2813-2831,共19页
Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows a... Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows attackers tocompromise. Byzantine attacks pose great threats to federated learning. Byzantine attackers upload maliciouslycreated local models to the server to affect the prediction performance and training speed of the global model. Todefend against Byzantine attacks, we propose a Byzantine robust federated learning scheme based on backdoortriggers. In our scheme, backdoor triggers are embedded into benign data samples, and then malicious localmodels can be identified by the server according to its validation dataset. Furthermore, we calculate the adjustmentfactors of local models according to the parameters of their final layers, which are used to defend against datapoisoning-based Byzantine attacks. To further enhance the robustness of our scheme, each localmodel is weightedand aggregated according to the number of times it is identified as malicious. Relevant experimental data showthat our scheme is effective against Byzantine attacks in both independent identically distributed (IID) and nonindependentidentically distributed (non-IID) scenarios. 展开更多
关键词 Federated learning byzantine attacks backdoor triggers
下载PDF
Byzantine Fault-Tolerant Routing for Large-Scale Wireless Sensor Networks Based on Fast ECDSA 被引量:1
12
作者 Jiawei Xu Keda Wang +4 位作者 Chao Wang Feng Hu Zhenhua Zhang Shiyi Xu Jie Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第6期627-633,共7页
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Gen... Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA(Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols.Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it. 展开更多
关键词 WIRELESS SENSOR NETWORKS byzantine Generals Proble
原文传递
Robustness and efficiency of voting consensus protocols within byzantine infrastructures
13
作者 Angelo Capossele Sebastian Müller Andreas Penzkofer 《Blockchain(Research and Applications)》 2021年第1期1-14,共14页
This paper investigates several voting consensus protocols with low computational complexity in noisy Byzantine infrastructures.Using computer simulations,we show that explicit randomization of the consensus protocol ... This paper investigates several voting consensus protocols with low computational complexity in noisy Byzantine infrastructures.Using computer simulations,we show that explicit randomization of the consensus protocol can significantly increase the robustness towards faulty and malicious nodes.We identify the optimal amount of randomness for various Byzantine attack strategies on different kinds of network topologies. 展开更多
关键词 Distributed systems Consensus protocols byzantine infrastructures Simulation studies
原文传递
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
14
作者 Rui Qiao hi Dong 《Computers, Materials & Continua》 SCIE EI 2023年第11期2505-2527,共23页
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ... Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications. 展开更多
关键词 Consortium chain byzantine CONSENSUS generation mechanism Internet of Things consensus vulnerability
下载PDF
SBFT:A BFT Consensus Mechanism Based on DQN Algorithm for Industrial Internet of Thing
15
作者 Ningjie Gao Ru Huo +3 位作者 Shuo Wang Jiang Liu Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2023年第10期185-199,共15页
With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to ... With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to the conflict between the operational performance and security of the blockchain system and the compatibility issues with a large number of IIoT devices running together,the mainstream blockchain system cannot be applied to IIoT scenarios.In order to solve these problems,this paper proposes SBFT(Speculative Byzantine Consensus Protocol),a flexible and scalable blockchain consensus mechanism for the Industrial Internet of Things.SBFT has a consensus process based on speculation,improving the throughput and consensus speed of blockchain systems and reducing communication overhead.In order to improve the compatibility and scalability of the blockchain system,we select some nodes to participate in the consensus,and these nodes have better performance in the network.Since multiple properties determine node performance,we abstract the node selection problem as a joint optimization problem and use Dueling Deep Q Learning(DQL)to solve it.Finally,we evaluate the performance of the scheme through simulation,and the simulation results prove the superiority of our scheme. 展开更多
关键词 Industrial Internet of Things byzantine fault tolerance speculative consensus mechanism Markov decision process deep reinforcement learning
下载PDF
Hybrid Smart Contracts for Securing IoMT Data
16
作者 D.Palanikkumar Adel Fahad Alrasheedi +2 位作者 P.Parthasarathi S.S.Askar Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期457-469,共13页
Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the ... Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the hospital,patients get health related information remotely from the physician.The main issues in the E-Medical application are lack of safety,security and priv-acy preservation of patient’s health care data.To overcome these issues,this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage.Patients health data is collected from physician,smart devices etc.The main goal is to store this highly valuable health related data in a secure,safety,easy access and less cost-effective manner.In this research we combine two smart contracts such as Practical Byzantine Fault Tolerance with proof of work(PBFT-PoW).The implementation is done using cloud technology setup with smart contracts(PBFT-PoW).The accuracy rate of PBFT is 90.15%,for PoW is 92.75%and our proposed work PBFT-PoW is 99.88%. 展开更多
关键词 PoW byzantine fault tolerance IoMT cloud computing health care data
下载PDF
Improved PBFT Consensus Algorithm Based on Node Role Division
17
作者 Xiyu Ren Xiangrong Tong Wei Zhang 《Journal of Computer and Communications》 2023年第2期20-38,共19页
The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to ... The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to support massive network nodes, the common participation over all nodes in the consensus mechanism would lead to increased communication complexity, and the arbitrary selection of master nodes would also lead to inefficient consensus. This paper offered a PBFT consensus method (Role Division-based Practical Byzantine Fault Tolerance, RD-PBFT) to address the above problems based on node role division. First, the nodes in the system voted with each other to divide the high reputation group and low reputation group, and determined the starting reputation value of the nodes. Then, the mobile node in the group was divided into roles according to the high reputation value, and a total of three roles were divided into consensus node, backup node, and supervisory node to reduce the number of nodes involved in the consensus process and reduced the complexity of communication. In addition, an adaptive method was used to select the master nodes in the consensus process, and an integer value was introduced to ensure the unpredictability and equality of the master node selection. Experimentally, it was verified that the algorithm has lower communication complexity and better decentralization characteristics compared with the PBFT consensus algorithm, which improved the efficiency of consensus. 展开更多
关键词 Blockchain Consensus Algorithm Practical byzantine Fault Tolerance Node Role Division
下载PDF
基于区块链的互联网医院云药房平台设计和实践 被引量:17
18
作者 魏明月 陈敏 +3 位作者 郁嘉波 许德俊 王淑 于广军 《中国卫生资源》 北大核心 2021年第3期219-222,共4页
目的应用区块链技术,构建互联网医院云药房处方流转可信安全互通机制,实现信息可信、过程可追溯,保障用药安全。方法通过对云药房的处方流转风险与问题分析,利用区块链去中心化、智能合约、防篡改和可追溯等技术特性,针对问题给出解决... 目的应用区块链技术,构建互联网医院云药房处方流转可信安全互通机制,实现信息可信、过程可追溯,保障用药安全。方法通过对云药房的处方流转风险与问题分析,利用区块链去中心化、智能合约、防篡改和可追溯等技术特性,针对问题给出解决问题的技术方案。结果提出基于区块链的互联网医院云药房平台管理架构,建设信息互联互通、处方信息认证、处方流转全程追溯机制,形成互联网医院电子处方流转多主体间透明、对等、可信的合作范式。结论实现互联网医院处方流转过程的规范化管理,确保互联网电子处方信息安全流通,保障患者用药安全。 展开更多
关键词 区块链blockchain 互联网医院internet hospital 互联网云药房平台internet cloud pharmacy platform 电子处方流转electronic prescription circulation 信息认证information authentication 流程追溯circulation traceability 实用拜占庭容错算法practical byzantine fault tolerance PBFT
下载PDF
入侵容忍技术在Web服务器系统的应用 被引量:2
19
作者 黄建华 夏亚敏 《计算机应用与软件》 CSCD 北大核心 2008年第3期252-253,282,共3页
提出了一个具有入侵容忍特性的Web服务器系统。在系统设计中结合入侵容忍通用模型SITAR,应用了多代理、多样性、冗余等入侵容忍技术,在响应的一致性协商过程中引入分散选举算法和加密技术,提高了运行效率,加强系统的安全性。
关键词 WEB服务器 分散选举 入侵容忍 byzantine容错
下载PDF
入侵容忍技术在Web服务器系统的应用
20
作者 黄建华 夏亚敏 《计算机与现代化》 2007年第1期67-70,共4页
结合入侵容忍通用模型SITAR和分散选举技术,提出了一个具有入侵容忍特性的Web服务器系统。在设计中应用了多代理、多样性、冗余等技术,在响应的一致性协商过程参考Byzantine容错算法,并引入Hash算法和加密技术,加强系统的安全,提高运行... 结合入侵容忍通用模型SITAR和分散选举技术,提出了一个具有入侵容忍特性的Web服务器系统。在设计中应用了多代理、多样性、冗余等技术,在响应的一致性协商过程参考Byzantine容错算法,并引入Hash算法和加密技术,加强系统的安全,提高运行效率。 展开更多
关键词 WEB服务 分散选举 入侵容忍 byzantine容错
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部