{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:28:25Z","timestamp":1737523705498,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540665311"},{"type":"electronic","value":"9783540481690"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48169-9_19","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T05:36:33Z","timestamp":1194240993000},"page":"269-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Self-Testing\/Correcting Protocols"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Franklin","sequence":"first","affiliation":[]},{"given":"Juan A.","family":"Garay","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,3]]},"reference":[{"issue":"1-2","key":"19_CR1","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0304-3975(96)00286-1","volume":"186","author":"Y. Afek","year":"1997","unstructured":"Y. Afek, S. Kutten and M. Yung, \u201cThe Local Detection Paradigm and Its Applications to Self-Stabilization.\u201d TCS 186(1-2), pp. 199\u2013229 (1997).","journal-title":"TCS"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"L. Adleman and K. Kompella. \u201cFast Checkers for Cryptography.\u201d In CRYPTO\u2019 90, pp. 515\u2013529.","DOI":"10.1007\/3-540-38424-3_36"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"B. Awerbuch, B. Patt-Shamir and G. Varghese, \u201cSelf Stabilizing by local Checking and Correction.\u201d In FOCS\u2019 91, pp. 268\u2013277.","DOI":"10.1109\/SFCS.1991.185378"},{"key":"19_CR4","unstructured":"M. Blum, \u201cDesigning programs to check their work.\u201d Communications of the ACM."},{"key":"19_CR5","unstructured":"P. Berman and A. Bharali, \u201cQuick Atomic Broadcast.\u201d In WDAG\u2019 93."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. \u201cChecking the Correctness of Memories.\u201d In FOCS\u2019 91, pp. 90\u201399.","DOI":"10.1109\/SFCS.1991.185352"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"D. Beaver and J. Feigenbaum, \u201dHiding Instances in Multioracle Queries.\u201d In STACS\u2019 90, pp. 37\u201348.","DOI":"10.1007\/3-540-52282-4_30"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Garay and T. Rabin. \u201cBatch Verification with Applications to Cryptography and Checking\u201d (invited paper). In LATIN\u2019 98, pp. 170\u2013191.","DOI":"10.1007\/BFb0054320"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson, \u201cCompleteness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.\u201d In STOC\u2019 88, pp. 1\u201310.","DOI":"10.1145\/62212.62213"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"M. Blum and S. Kannan, \u201cDesigning programs to check their work.\u201d In STOC\u2019 89, pp. 86\u201397.","DOI":"10.1145\/73007.73015"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"M. Blum, M. Luby, and R. Rubinfeld, \u201cSelf-Testing\/Correcting with Applications to Numerical Problems.\u201d In STOC\u2019 90, pp. 73\u201383.","DOI":"10.1145\/100216.100225"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Crepeau and I. Damgard. \u201cMultiparty Unconditionally Secure Protocols.\u201d In STOC\u2019 88, pp. 11\u201319.","DOI":"10.1145\/62212.62214"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"B. Chor, M. Merritt, and D. Shmoys, \u201cSimple Constant-Time Consensus Protocols in Realistic Failure Models.\u201d In PODC\u2019 85, pp. 152\u2013162.","DOI":"10.1145\/323596.323610"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0196-6774(82)90004-9","volume":"3","author":"D. Dolev","year":"1982","unstructured":"D. Dolev, \u201cThe Byzantine Generals Strike Again,\u201d Journal of Algorithms, 3(1):14\u201330, January 1982.","journal-title":"Journal of Algorithms"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"S. Dolev, A. Israeli and S. Moran, \u201cSelf Stabilization of Dynamic Systems assuming only Read\/Write Atomicity.\u201d In PODC\u2019 90, pp. 103\u2013117.","DOI":"10.1145\/93385.93407"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0890-5401(90)90014-9","volume":"88","author":"C. Dwork","year":"1990","unstructured":"C. Dwork and Y. Moses, \u201cKnowledge and common knowledge in a Byzantine environment: crash failures.\u201d Information and Computation 88, pp. 156\u2013186 (1990).","journal-title":"Information and Computation"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"F. Ergun, S. Ravi Kumar and R. Rubinfeld. \u201cApproximate Checking of Polynomials and Functional Equations.\u201d In FOCS\u2019 96, pp. 592\u2013601.","DOI":"10.1109\/SFCS.1996.548518"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Y. Frankel, P. Gemmell and M. Yung. \u201cWitness-Based Cryptographic Program Checking and Robust Function Sharing.\u201d In STOC\u2019 96, pp. 499\u2013508.","DOI":"10.1145\/237814.237998"},{"key":"19_CR19","unstructured":"P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. \u201cSelf-testing\/ correcting for polynomials and for approximate functions.\u201c In STOC\u2019 91, pp. 32\u201342."},{"key":"19_CR20","unstructured":"S. Kannan, \u201cProgram Checkers for Algebraic Problems.\u201d Ph.D. Thesis, ICSI TR-89-064, December 1989."},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/0196-6774(89)90038-2","volume":"10","author":"R. Karp","year":"1989","unstructured":"R. Karp, M. Luby, and N. Madras, \u201cMonte-Carlo Approximation Algorithms for Enumeration Problems.\u201d Journal of Algorithms 10, pp. 429\u2013448 (1989).","journal-title":"Journal of Algorithms"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"S. Katz and K. Perry, \u201cSelf-Stabilizing Extensions for Message-Passing Systems.\u201d In PODC\u2019 90, pp. 91\u2013101.","DOI":"10.1145\/93385.93405"},{"key":"19_CR23","first-page":"191","volume":"2","author":"R. Lipton","year":"1991","unstructured":"R. Lipton, \u201cNew Directions in Testing,\u201d DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 2 (1991), pp. 191\u2013202.","journal-title":"DIMACS Series in Discrete Mathematics and Theoretical Computer Science"},{"issue":"3","key":"19_CR24","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"L. Lamport, R.E. Shostak and M. Pease, \u201cThe Byzantine Generals Problem,\u201d ACM ToPLaS, Vol. 4,No. 3 (1982), pp. 382\u2013401.","journal-title":"ACM ToPLaS"},{"key":"19_CR25","unstructured":"R. Rubinfeld, \u201cA Mathematical Theory of Self-Checking, Self-Testing and Self-Correcting Programs.\u201d Ph.D. Thesis, ICSI TR-90-054, October 1990."},{"key":"19_CR26","unstructured":"R. Rubinfeld. \u201cOn the Robustness of Functional Equations.\u201d In FOCS\u2019 94, pp. 2\u201313."},{"issue":"4","key":"19_CR27","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/BF01961540","volume":"15","author":"R. Rubinfeld","year":"1996","unstructured":"R. Rubinfeld. \u201cDesigning Checkers for Programs that Run in Parallel.\u201d Algorithmica 15(4), pp. 287\u2013301, 1996.","journal-title":"Algorithmica"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48169-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:01:47Z","timestamp":1737514907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48169-9_19"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540665311","9783540481690"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-48169-9_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"3 June 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}