August 29, 2019

Implementing a Nokia Bell Labs automated patch management via the Blockchain technology

  • Sekar V.

1 Introduction 2 Vulnerability Management 2.1 Threats and Patch management needs . . . . . . . . . . . . . . 2.2 Patch management policies and solutions . . . . . . . . . . . . 2.3 Existing Patching management methods and its challenges . 3 Proposed System 4 BFT Protocol 4.1 Challenges in existing BFT protocol . . . . . . . . . . . . . . . 5 HoneyBadger BFT 5.1 Features and Assumptions . . . . . . . . . . . . 5.1.1 Communication Network Assumptions 5.1.2 Timing Assumptions . . . . . . . . . . . 5.1.3 System Assumptions . . . . . . . . . . . 5.2 HBBFT protocol construction . . . . . . . . . . 5.2.1 Erasure Coding . . . . . . . . . . . . . . 5.2.2 Merkle Tree . . . . . . . . . . . . . . . . 5.2.3 Reliable Broadcast . . . . . . . . . . . . 5.2.4 Threshold Cryptography . . . . . . . . . 5.2.5 Cryptographic Common Coin . . . . . . 5.2.6 Binary Byzantine Agreement . . . . . . 5.2.7 Common Subset Agreement . . . . . . . 5.2.8 Construction of HoneyBadger BFT . . 6 Comparison HBBFT with other protocols 6.1 Network Model and Message Transmission 6.2 Attacks prevention and threats . . . . . . . 6.3 Blockchain Types and Timing Assumptions 6.4 Mining Methods . . . . . . . . . . . . . . . . 1 2 4 5 7 8 10 12 13 14 14 15 15 15 16 16 16 17 17 17 19 19 19 21 21 22 23 23

View Original Article

Recent Publications

May 01, 2020

A Packaged 0.01-26-GHz Single-Chip SiGe Reflectometer for Two-Port Vector Network Analyzers

  • Chung H.
  • Ma Q.
  • Rebeiz G.
  • Sayginer M.

© 1963-2012 IEEE. This article presents a packaged SiGe BiCMOS reflectometer for 0.01-26-GHz two-port vector network analyzers (VNAs). The reflectometer chip is composed of a resistive bridge coupler and two wideband heterodyne receivers for coherent magnitude and phase detection. In addition, a high-linearity receiver channel is designed to accommodate 20 ...

August 01, 2019

Protecting photonic quantum states using topology

  • Blanco-Redondo A.

The use of topology to protect quantum information is well-known to the condensed-matter community and, indeed, topological quantum computing is a bursting field of research and one of the competing avenues to demonstrate that quantum computers can complete certain problems that classical computers cannot. In photonics, however, we are only ...

May 01, 2019

Digital networks at the nexus of productivity growth

  • Kamat S.
  • Prakash S.
  • Saniee I.
  • Weldon M.

This paper takes a fresh look at the debate over the relationship between digital technology and productivity. The argument of economic historian Robert J. Gordon is that digital technology will not lead to increases in productivity such as we saw in the last century, based on his analysis of the ...