{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:23:41Z","timestamp":1729646621856,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194955","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"149-151","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion tolerant distributed object systems: project summary"],"prefix":"10.1109","volume":"2","author":[{"given":"G.","family":"Tally","sequence":"first","affiliation":[]},{"given":"B.","family":"Whitmore","sequence":"additional","affiliation":[]},{"given":"D.","family":"Sames","sequence":"additional","affiliation":[]},{"given":"B.","family":"Matt","sequence":"additional","affiliation":[]},{"given":"B.","family":"Niebuhr","sequence":"additional","affiliation":[]},{"given":"D.","family":"Bakken","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proceedings of the 2nd USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref3","article-title":"Proactive Recovery in a Byzantine-Fault-Tolerant System","author":"castro","year":"2000","journal-title":"Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref10","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"shamir","year":"1978","journal-title":"Communications of the ACM"},{"journal-title":"U S Department of Commerce\/National Bureau of Standards National Technical Information Service","article-title":"Data encryption standard, Federal Information Processing Standards Publication 46&#x2013;3","year":"1999","key":"ref6"},{"key":"ref11","article-title":"The MD5 Message-Digest Algorithm","author":"rivest","year":"1992","journal-title":"Internet RFC-1321"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243618"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine Generals Problem","volume":"4","author":"shostak","year":"1982","journal-title":"ACM Transactions on Programming Languages and Systems"},{"year":"0","key":"ref7"},{"key":"ref2","article-title":"Asynchronous Consensus and Broadcast Protocols","volume":"32","author":"bracha","year":"1995","journal-title":"Journal of the ACM"},{"journal-title":"The Common Object Request Broker Architecture and Specification Revision 2 5","year":"2001","key":"ref9"},{"key":"ref1","article-title":"Middleware","author":"bakken","year":"2001","journal-title":"Encyclopedia of Distributed Computing"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194955.pdf?arnumber=1194955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:25:42Z","timestamp":1497572742000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194955","relation":{},"subject":[]}}