🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤝 Consensus Algorithms

Byzantine Fault Tolerance, Distributed Agreement, Blockchain Fundamentals, Network Reliability

Implementation and Evaluation of Fast Raft for Hierarchical Consensus
arxiv.org·1d
🤝Consensus Protocols
Slashing CI Costs at Uber
uber.com·8h·
Discuss: Hacker News
🔄Reproducible Builds
Design, Implementation, and Analysis of Fair Faucets for Blockchain Ecosystems
arxiv.org·1d
🤝Distributed Consensus
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·3h
🎯Threat Hunting
Single Core Hundred Thousand Concurrency(1750866547511600)
dev.to·2h·
Discuss: DEV
🌊Stream Processing
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·8h
🎫Kerberos Attacks
Resilience assessment framework for cyber-physical distribution power system based on coordinated cyber-physical attacks under dynamic game
arxiv.org·14h
🤝Distributed Consensus
Privacy-Preserving Resilient Vector Consensus
arxiv.org·1d
🤝Paxos Consensus
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·1d
🌳Archive Merkle Trees
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·3h
🤖Network Automation
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
Why Agentic Flows Need Distributed-Systems Discipline
temporal.io·1d·
Discuss: Hacker News
⚙️TLA+
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Signal Use and Emergent Cooperation
arxiv.org·14h
🔲Cellular Automata
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security
dev.to·5d·
Discuss: DEV
🤝Distributed Consensus
How the US Military Is Redefining Zero Trust
darkreading.com·1d
🌐Network Security
A Comparative Analysis of Distributed Linear Solvers under Data Heterogeneity
arxiv.org·1d
⚡Parallel Computing
Agentic AI: Implementing Long-Term Memory
towardsdatascience.com·22h
💾Persistence Strategies
How to (Almost) solve cybersecurity once and for all
adaptive.live·21h·
Discuss: Hacker News
🔐Systems Hardening
List-Decodable Byzantine Robust PIR: Lower Communication Complexity, Higher Byzantine Tolerance, Smaller List Size
arxiv.org·1d
🛡️Byzantine Fault Tolerance
Loading...Loading more...
AboutBlogChangelogRoadmap