{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T20:10:24Z","timestamp":1735416624368,"version":"3.32.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Combinatorica"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1007\/bf01299739","type":"journal-article","created":{"date-parts":[[2005,3,25]],"date-time":"2005-03-25T04:14:22Z","timestamp":1111724062000},"page":"319-332","source":"Crossref","is-referenced-by-count":12,"title":["Fast perfect-information leader-election protocols with linear immunity"],"prefix":"10.1007","volume":"15","author":[{"given":"Jason","family":"Cooper","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Linial","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/BF01303199","volume":"13","author":"M. Ajtai","year":"1993","unstructured":"M. Ajtai, andN. Linial: The influence of large coalitions,Combinatorica,13 (1993) 129?145.","journal-title":"Combinatorica"},{"key":"CR2","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1137\/0222030","volume":"22","author":"N. Alon","year":"1993","unstructured":"N. Alon, andM. Naor: Coin-flipping games immune against linear-sized coalitions,SIAM J. Computing,22 (1993) 403?417.","journal-title":"SIAM J. Computing"},{"key":"CR3","unstructured":"N. Alon, andJ. Spencer:The Probabilistic Method, Wiley, 1992."},{"key":"CR4","unstructured":"M. Ben-Or, andN. Linial: Collective coin flipping, inRandomness and Computation, (S. Micali, ed.) Academic Press, 1989, 91?115."},{"key":"CR5","doi-asserted-by":"crossref","unstructured":"A. Cohen, andA. Wigderson: Dispersers, deterministic amplification, and weak random sources,Proc. 30th IEEE Symp. on the Foundations of Computer Science (1989) 14?19.","DOI":"10.1109\/SFCS.1989.63449"},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"P. Feldman, andS. Micali: Optimal algorithms for Byzantine Agreement,Proc. 20th Annual ACM Symp. on Theory of Computing (1988) 148?161.","DOI":"10.1145\/62212.62225"},{"key":"CR7","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Goldwasser, andN. Linial: Fault-tolerant computation in the full information model,32nd Symposium on the Foundations of Computer Science (1991) 447?457.","DOI":"10.1109\/SFCS.1991.185405"},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"J. Kahn, G. Kalai, andN. Linial: The influence of variables on boolean functions,29th Symposium on the Foundations of Computer Science, White Planes, 1988, 68?80.","DOI":"10.1109\/SFCS.1988.21923"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"N. Linial: Games Computers Play-Game-Theoretic Aspects of Computer Science, in:Handbook of Game Theory with Economic Applications (R. J. Aumann and S. Hart eds.) North Holland, to appear 1994. Also available as a Leibniz Center, Computer Science Dept. Hebrew University, Tech. Report 5-92.","DOI":"10.1016\/S1574-0005(05)80070-0"},{"key":"CR10","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF02126799","volume":"8","author":"A. Lubotzky","year":"1988","unstructured":"A. Lubotzky, R. Phillips, andP. Sarnak: Ramanujan Graphs,Combinatorica 8 (1988), 261?277.","journal-title":"Combinatorica"},{"key":"CR11","unstructured":"I. S. Rombauer, andM. Rombauer Becker:Joy of Cooking, Hobbs-Merril, 1979, 154."},{"key":"CR12","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1137\/0402020","volume":"2","author":"M. Saks","year":"1989","unstructured":"M. Saks: A robust noncryptographic protocol for collective coin flipping,SIAM J. Discrete Math. 2 (1989) 240?244.","journal-title":"SIAM J. Discrete Math."}],"container-title":["Combinatorica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01299739.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01299739\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01299739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T19:52:15Z","timestamp":1735415535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01299739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["BF01299739"],"URL":"https:\/\/doi.org\/10.1007\/bf01299739","relation":{},"ISSN":["0209-9683","1439-6912"],"issn-type":[{"type":"print","value":"0209-9683"},{"type":"electronic","value":"1439-6912"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}