Zobrazeno 1 - 10
of 122
pro vyhledávání: '"ALVISI, LORENZO"'
For nearly a decade, disinformation has dominated social debates, with its harmful impacts growing more evident. Episodes like the January 6 United States Capitol attack and the Rohingya genocide exemplify how this phenomenon has been weaponized. Whi
Externí odkaz:
http://arxiv.org/abs/2406.08963
Telegram has grown into a significant platform for news and information sharing, favored for its anonymity and minimal moderation. This openness, however, makes it vulnerable to misinformation and conspiracy theories. In this study, we explore the dy
Externí odkaz:
http://arxiv.org/abs/2404.18602
Today's practical, high performance Byzantine Fault Tolerant (BFT) consensus protocols operate in the partial synchrony model. However, existing protocols are inefficient when deployments are indeed partially synchronous. They deliver either low late
Externí odkaz:
http://arxiv.org/abs/2401.10369
Nakamoto's consensus protocol works in a permissionless model and tolerates Byzantine failures, but only offers probabilistic agreement. Recently, the Sandglass protocol has shown such weaker guarantees are not a necessary consequence of a permission
Externí odkaz:
http://arxiv.org/abs/2308.04080
Autor:
Suri-Payer, Florian, Burke, Matthew, Wang, Zheng, Zhang, Yunhao, Alvisi, Lorenzo, Crooks, Natacha
This paper presents Basil, the first transactional, leaderless Byzantine Fault Tolerant key-value store. Basil leverages ACID transactions to scalably implement the abstraction of a trusted shared log in the presence of Byzantine actors. Unlike tradi
Externí odkaz:
http://arxiv.org/abs/2109.12443
Autor:
Crooks, Natacha, Burke, Matthew, Cecchetti, Ethan, Harel, Sitar, Agarwal, Rachit, Alvisi, Lorenzo
This paper presents the design and implementation of Obladi, the first system to provide ACID transactions while also hiding access patterns. Obladi uses as its building block oblivious RAM, but turns the demands of supporting transactions into a per
Externí odkaz:
http://arxiv.org/abs/1809.10559
Autor:
Abraham, Ittai, Gueta, Guy, Malkhi, Dahlia, Alvisi, Lorenzo, Kotla, Rama, Martin, Jean-Philippe
In this note, we observe a safety violation in Zyzzyva and a liveness violation in FaB. To demonstrate these issues, we require relatively simple scenarios, involving only four replicas, and one or two view changes. In all of them, the problem is man
Externí odkaz:
http://arxiv.org/abs/1712.01367
Autor:
Abowd, John, Alvisi, Lorenzo, Dwork, Cynthia, Kannan, Sampath, Machanavajjhala, Ashwin, Reiter, Jerome
Government statistical agencies collect enormously valuable data on the nation's population and business activities. Wide access to these data enables evidence-based policy making, supports new research that improves society, facilitates training for
Externí odkaz:
http://arxiv.org/abs/1701.00752
Emails today are often encrypted, but only between mail servers---the vast majority of emails are exposed in plaintext to the mail servers that handle them. While better than no encryption, this arrangement leaves open the possibility of attacks, pri
Externí odkaz:
http://arxiv.org/abs/1612.04265
Publikováno v:
Esprit, 2020 Jul 01(466), 79-88.
Externí odkaz:
https://www.jstor.org/stable/26934100