The Bit Complexity of Randomized Leader Election on a Ring, SIAM Journal on Computing, vol.18, issue.1, pp.12-29, 1989. ,
DOI : 10.1137/0218002
A simple bivalency proof that t-resilient consensus requires t + 1 rounds, Inf. Process. Lett, vol.71, pp.3-4155, 1999. ,
Local and global properties in networks of processors (Extended Abstract), Proceedings of the twelfth annual ACM symposium on Theory of computing , STOC '80, pp.82-93, 1980. ,
DOI : 10.1145/800141.804655
Failure detectors in homonymous distributed systems (with an application to consensus), ICDCS, pp.275-284, 2012. ,
Relationships between broadcast and shared memory in reliable anonymous distributed systems, Distributed Computing, vol.34, issue.3, pp.209-219, 2006. ,
DOI : 10.1007/s00446-005-0145-4
Computing in Totally Anonymous Asynchronous Shared Memory Systems, Information and Computation, vol.173, issue.2, pp.162-183, 2002. ,
DOI : 10.1006/inco.2001.3119
Computing in Totally Anonymous Asynchronous Shared Memory Systems, Information and Computation, vol.173, issue.2, pp.162-183, 2002. ,
DOI : 10.1006/inco.2001.3119
Distributed Computing: fundamentals, simulations and advanced topics, 2004. ,
DOI : 10.1002/0471478210
Byzantine Agreement Using Partial Authentication, DISC, pp.389-403, 2011. ,
DOI : 10.1007/BF01667080
Project ?Äú anonymity and unobservability in the internet ?Äù, Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, CFP '00, pp.57-65, 2000. ,
Computing anonymously with arbitrary knowledge, Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing , PODC '99, pp.181-188, 1999. ,
DOI : 10.1145/301308.301355
An Effective Characterization of Computability in Anonymous Networks, DISC, pp.33-47, 2001. ,
DOI : 10.1007/3-540-45414-4_3
The Price of Anonymity, ACM Transactions on Autonomous and Adaptive Systems, vol.6, issue.4, p.23, 2011. ,
DOI : 10.1145/2019591.2019592
URL : https://hal.archives-ouvertes.fr/inria-00348302
Mantis: A lightweight, server-anonymity preserving, searchable p2p network, INFORMATION SECURITY INSTITUTE, 2004. ,
On the importance of having an identity or, is consensus really universal? Distributed Computing, pp.167-176, 2006. ,
Uniform self-stabilizing rings, ACM Trans. Program ,
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
Uniform consensus is harder than consensus, Journal of Algorithms, vol.51, issue.1, pp.15-37, 2004. ,
DOI : 10.1016/j.jalgor.2003.11.001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8980
Group Signatures, Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques , EUROCRYPT'91, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Group Signatures, EUROCRYPT, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Two Consensus Algorithms with Atomic Registers and Failure Detector ??, Lecture Notes in Computer Science, vol.73, issue.5-6, pp.251-262, 2009. ,
DOI : 10.1016/S0020-0190(00)00027-2
Byzantine agreement with homonyms, PODC, pp.21-30, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00580133
Fault-Tolerant Consensus in Unknown and Anonymous Networks, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.368-375, 2009. ,
DOI : 10.1109/ICDCS.2009.36
URL : https://hal.archives-ouvertes.fr/hal-00369280
Self-stabilizing systems in spite of distributed control, Commun ,
On the minimal synchronism needed for distributed consensus, Journal of the ACM, vol.34, issue.1, pp.77-97, 1987. ,
DOI : 10.1145/7531.7533
An efficient algorithm for byzantine agreement without authentication, Information and Control, vol.52, issue.3, pp.257-274, 1982. ,
DOI : 10.1016/S0019-9958(82)90776-8
Early stopping in Byzantine agreement, Journal of the ACM, vol.37, issue.4, pp.720-741, 1990. ,
DOI : 10.1145/96559.96565
Polynomial algorithms for multiple processor agreement, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.401-407, 1982. ,
DOI : 10.1145/800070.802215
Authenticated Algorithms for Byzantine Agreement, SIAM Journal on Computing, vol.12, issue.4, pp.656-666, 1983. ,
DOI : 10.1137/0212045
The sybil attack, IPTPS, pp.251-260, 2002. ,
Consensus in the presence of partial synchrony, Journal of the ACM, vol.35, issue.2, pp.288-323, 1988. ,
DOI : 10.1145/42282.42283
Knowledge and common knowledge in a Byzantine environment: Crash failures, Information and Computation, vol.88, issue.2, pp.156-186, 1990. ,
DOI : 10.1016/0890-5401(90)90014-9
A lower bound for the time to assure interactive consistency, Information Processing Letters, vol.14, issue.4, pp.183-186, 1981. ,
DOI : 10.1016/0020-0190(82)90033-3
Easy impossibility proofs for distributed consensus problems, Proceedings of the fourth annual ACM symposium on Principles of distributed computing , PODC '85, pp.26-39, 1986. ,
DOI : 10.1145/323596.323602
Authenticated broadcast with a partially compromised public-key infrastructure, SSS, pp.144-158, 2010. ,
Revisiting the relation between non-blocking atommic commitment and consensus ,
A Note on Set Agreement with Omission Failures1 1This work is partially supported by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322., Electronic Notes in Theoretical Computer Science, vol.81, pp.48-58, 2003. ,
DOI : 10.1016/S1571-0661(04)80835-1
Anonymous and fault-tolerant shared-memory computing, Distributed Computing, pp.165-177, 2007. ,
DOI : 10.1007/s00446-007-0042-0
Authenticated Byzantine Generals in Dual Failure Model, ICDCN, pp.79-91, 2010. ,
DOI : 10.1007/978-3-642-11322-2_12
Leader election in uniform rings, ACM Trans. Program. Lang. Syst, vol.15, issue.3, pp.563-573, 1993. ,
Wakeup under read/write atomicity, Proc. 4th International Workshop on Distributed Algorithms, pp.277-288, 1990. ,
DOI : 10.1007/3-540-54099-7_19
Scalable byzantine computation, ACM SIGACT News, vol.41, issue.3, pp.89-104, 2010. ,
DOI : 10.1145/1855118.1855136
Elements of Distributed Computing, 2002. ,
Sublinear bounds for randomized leader election, ICDCN, pp.348-362, 2013. ,
Using Time Instead of Timeout for Fault-Tolerant Distributed Systems., ACM Transactions on Programming Languages and Systems, vol.6, issue.2, pp.254-280, 1984. ,
DOI : 10.1145/2993.2994
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1697
Memory requirements for agreement among unreliable asynchronous processes, 1987. ,
Distributed Algorithms, 1996. ,
Brief Announcement: Naming and Counting in Anonymous Unknown Dynamic Networks, Lecture Notes in Computer Science, vol.7611, pp.437-438 ,
DOI : 10.1007/978-3-642-33651-5_46
Methods for distributed transaction commit and recovery using Byzantine agreement within clusters of processors, pp.89-103 ,
Automatically increasing the fault-tolerance of distributed algorithms, Journal of Algorithms, vol.11, issue.3, pp.374-419, 1990. ,
DOI : 10.1016/0196-6774(90)90019-B
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004. ,
DOI : 10.1145/984622.984660
Agreement Among Unacquainted Byzantine Generals, Lecture Notes in Computer Science, vol.3724, pp.499-500 ,
DOI : 10.1007/11561927_40
Uniform agreement despite process omission failures, IPDPS, page 212, 2003. ,
Optimal early stopping uniform consensus in synchronous systems with process omission failures, SPAA, pp.302-310, 2004. ,
Reaching Agreement in the Presence of Faults, Journal of the ACM, vol.27, issue.2, pp.228-234, 1980. ,
DOI : 10.1145/322186.322188
Distributed agreement in the presence of processor and communication faults, IEEE Trans. Software Eng, vol.12, issue.3, pp.477-482, 1986. ,
Consensus in synchronous systems: a concise guided tour, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., pp.221-228, 2002. ,
DOI : 10.1109/PRDC.2002.1185641
Crowds: anonymity for web transactions ,
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Middleware, pp.329-350, 2001. ,
Simulating authenticated broadcasts to derive simple fault-tolerant algorithms, Distributed Computing, pp.80-94, 1987. ,
DOI : 10.1007/BF01667080
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, pp.65-70, 2007. ,
DOI : 10.1145/1290168.1290176
Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM, pp.149-160, 2001. ,
Fast Distributed Agreement, SIAM Journal on Computing, vol.16, issue.3, pp.445-457, 1987. ,
DOI : 10.1137/0216031
How to Break MD5 and Other Hash Functions, EUROCRYPT, pp.19-35, 2005. ,
DOI : 10.1007/11426639_2
SELF-STABILIZING ANONYMOUS LEADER ELECTION IN A TREE, IPDPS. IEEE Computer Society, 2005. ,
DOI : 10.1142/S0129054106003851
Computing on an anonymous network, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.69-89, 1996. ,
DOI : 10.1145/62546.62568