{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:39Z","timestamp":1725494379190},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766261"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76627-8_15","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T15:44:09Z","timestamp":1194277449000},"page":"173-188","source":"Crossref","is-referenced-by-count":2,"title":["Secure Failure Detection in TrustedPals"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Corti\u00f1as","sequence":"first","affiliation":[]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[]},{"given":"Marjan","family":"Ghajar-Azadanlou","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Lafuente","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Larrea","sequence":"additional","affiliation":[]},{"given":"Lucia Draque","family":"Penso","sequence":"additional","affiliation":[]},{"given":"Iratxe","family":"Soraluze","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/11408901_5","volume-title":"EDCC 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., G\u00e4rtner, F., Guerraoui, R., Vukolic, M.: Gracefully degrading fair exchange with security modules. In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol.\u00a03463, pp. 55\u201371. Springer, Heidelberg (2005)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-540-24591-9_15","volume-title":"Information Security Applications","author":"G. Avoine","year":"2004","unstructured":"Avoine, G., Vaudenay, S.: Optimal fair exchange with guardian angels. In: Chae, K.J., Yung, M. (eds.) Information Security Applications. LNCS, vol.\u00a02908, pp. 188\u2013202. Springer, Heidelberg (2004)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","first-page":"306","volume-title":"ESORICS 2006","author":"Z. Benenson","year":"2006","unstructured":"Benenson, Z., Fort, M., Freiling, F., Kesdogan, D., Penso, L.D.: Trustedpals: Secure multiparty computation implemented with smartcards. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 306\u2013314. Springer, Heidelberg (2006)"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of the ACM"},{"key":"15_CR5","volume-title":"Java Card Technology for Smart Cards","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards, 1st edn. Addison-Wesley, Reading (2000)","edition":"1"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-36080-8_21","volume-title":"Dependable Computing EDCC-4","author":"M. Correia","year":"2002","unstructured":"Correia, M., Ver\u00edssimo, P., Neves, N.F.: The design of a COTS-Real-time distributed security kernel. In: Bondavalli, A., Th\u00e9venod-Fosse, P. (eds.) Dependable Computing EDCC-4. LNCS, vol.\u00a02485, pp. 234\u2013252. Springer, Heidelberg (2002)"},{"key":"15_CR7","unstructured":"Corti\u00f1as, R., Freiling, F.C., Ghajar-Azadanlou, M., Lafuente, A., Larrea, M., Penso, L.D., Soraluze, I.: Secure Failure Detection in TrustedPals. Technical Report EHU-KAT-IK-07-07, The University of the Basque Country, (July 2007), Available at http:\/\/www.sc.ehu.es\/acwlaalm\/"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11560647_26","volume-title":"ICTAC 2005","author":"C. Delporte-Gallet","year":"2005","unstructured":"Delporte-Gallet, C., Fauconnier, H., Freiling, F.C.: Revisiting failure detection and consensus in omission failure environments. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, Springer, Heidelberg (2005)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dolev, D., Friedman, R., Keidar, I., Malkhi, D.: Failure detectors in omission failure environments. Technical Report TR96-1608, Cornell University, Computer Science Department (September 1996)","DOI":"10.1145\/259380.259501"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Dolev, D., Friedman, R., Keidar, I., Malkhi, D.: Failure detectors in omission failure environments. In: Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, p. 286 (1997)","DOI":"10.1145\/259380.259501"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Doudou, A., Garbinato, B., Guerraoui, R.: Encapsulating failure detection: from crash to Byzantine failures. In: Proceedings of the Int. Conference on Reliable Software Technologies, Vienna (May 2002)","DOI":"10.1007\/3-540-48046-3_3"},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1145\/42282.42283","volume":"35","author":"C. Dwork","year":"1988","unstructured":"Dwork, C., Lynch, N.A., Stockmeyer, L.: Consensus in the presence of partial synchrony. Journal of the ACM\u00a035(2), 288\u2013323 (1988)","journal-title":"Journal of the ACM"},{"key":"15_CR13","unstructured":"Freiling, F.C., Guerraoui, R., Kouznetsov, P.: The failure detector abstraction. Technical report, Department for Mathematics and Computer Science, University of Mannheim (2006)"},{"key":"15_CR14","unstructured":"Hadzilacos, V.: Issues of Fault Tolerance in Concurrent Computations. PhD thesis, Harvard University 1984, also published as Technical Report TR11-84"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: Byzantine fault detectors for solving consensus. The Computer Journal\u00a046(1) (2003)","DOI":"10.1093\/comjnl\/46.1.16"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"15_CR17","volume-title":"ACM SIGSAC","author":"P. MacKenzie","year":"2003","unstructured":"MacKenzie, P., Oprea, A., Reiter, M.: Automatic generation of two-party computations. In: ACM SIGSAC. SIGSAC: 10th ACM Conference on Computer and Communications Security, ACM Press, New York (2003)"},{"key":"15_CR18","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay \u2014 A secure two-party computation system. In: USENIX. Proceedings of the 13th USENIX Security Symposium (August 2004)"},{"issue":"4","key":"15_CR19","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/32.917522","volume":"27","author":"\u00d6. Babaoglu","year":"2001","unstructured":"Babaoglu, \u00d6., Davoli, R., Montresor, A.: Group communication in partitionable systems: Specification and algorithms. IEEE Trans. Softw. Eng.\u00a027(4), 308\u2013336 (2001)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"15_CR20","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1109\/TSE.1986.6312888","volume":"12","author":"K.J. Perry","year":"1986","unstructured":"Perry, K.J., Toueg, S.: Distributed agreement in the presence of processor and communication faults. IEEE Transactions on Software Engineering\u00a012(3), 477\u2013482 (1986)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Sousa, P., Neves, N.F., Ver\u00edssimo, P.: Proactive resilience through architectural hybridization. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 686\u2013690 (2006)","DOI":"10.1145\/1141277.1141435"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the Twenty-Third Annual Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76627-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:55:21Z","timestamp":1619520921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76627-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540766261"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76627-8_15","relation":{},"subject":[]}}