{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:05:33Z","timestamp":1768338333512,"version":"3.49.0"},"reference-count":42,"publisher":"Informa UK Limited","issue":"5","funder":[{"name":"French ANR project SocioPlug","award":["ANR-13-INFR-0003"],"award-info":[{"award-number":["ANR-13-INFR-0003"]}]},{"name":"DeSceNt project","award":["ANR-10-LABX-07-01"],"award-info":[{"award-number":["ANR-10-LABX-07-01"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"published-print":{"date-parts":[[2021,9,3]]},"DOI":"10.1080\/17445760.2021.1939873","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T05:00:11Z","timestamp":1624251611000},"page":"412-439","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Byzantine-tolerant uniform node sampling service in large-scale networks"],"prefix":"10.1080","volume":"36","author":[{"given":"Emmanuelle","family":"Anceaume","sequence":"first","affiliation":[{"name":"CNRS, Univ Rennes, Inria, IRISA, Rennes, France"}]},{"given":"Yann","family":"Busnel","sequence":"additional","affiliation":[{"name":"IMT Atlantique, IRISA, Cesson-S\u00e9vign\u00e9, France"}]},{"given":"Bruno","family":"Sericola","sequence":"additional","affiliation":[{"name":"CNRS, Univ Rennes, Inria, IRISA, Rennes, France"}]}],"member":"301","published-online":{"date-parts":[[2021,6,20]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514206"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/1275517.1275520"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2001730"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.020"},{"key":"CIT0007","unstructured":"Liu D, Ning P, Du W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS); Columbus, OH; 2005. p. 609\u2013619."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45269-7_5"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.03.008"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_25"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27836-8_18"},{"key":"CIT0014","unstructured":"Awerbuch B, Scheideler C. Towards a scalable and robust overlay network. Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS); Bellevue, WA; 2007."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958248"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.19"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988347"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1561\/040000000"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45726-7_1"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807094"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237823"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(03)00400-6"},{"key":"CIT0024","unstructured":"Chakrabarti A, Cormode G, McGregor A. A near-optimal algorithm for computing the entropy of a stream. Proceedings of the ACM-SIAM Symposium on Discrete Algorithms; New Orleans, LA; 2007. p. 328\u2013335."},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140295"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55696-2_1"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2014.27"},{"key":"CIT0028","volume-title":"Distributed algorithms","author":"Lynch N.","year":"1996"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159931"},{"issue":"57","key":"CIT0030","volume":"37","author":"Vitter J.","year":"1985","journal-title":"ACM Trans Math Softw"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575363"},{"key":"CIT0032","volume-title":"Finite Markov chains","author":"Keneny JG","year":"1976"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.2307\/3214403"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"CIT0035","unstructured":"Archive TIT. Available from: http:\/\/ita.ee.lbl.gov\/html\/traces.html [Lawrence berkeley national laboratory]; Online on Feb. 2016."},{"key":"CIT0036","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system; 2008. Available from: https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243848"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"CIT0041","unstructured":"Daian P, Pass R, Shi E. Snow White: Provably Secure Proofs of Stake [Cryptology eprint archive, report 2016\/919]; 2016. Available from: https:\/\/eprint.iacr.org\/2016\/919"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA50787.2020.9274084"}],"container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17445760.2021.1939873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T06:35:17Z","timestamp":1626762917000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17445760.2021.1939873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,20]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9,3]]}},"alternative-id":["10.1080\/17445760.2021.1939873"],"URL":"https:\/\/doi.org\/10.1080\/17445760.2021.1939873","relation":{},"ISSN":["1744-5760","1744-5779"],"issn-type":[{"value":"1744-5760","type":"print"},{"value":"1744-5779","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-03-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}