{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:02:20Z","timestamp":1768399340369,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/reldis.2004.1353018","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T09:34:02Z","timestamp":1103794442000},"page":"174-183","source":"Crossref","is-referenced-by-count":68,"title":["How to tolerate half less one Byzantine nodes in practical distributed systems"],"prefix":"10.1109","author":[{"given":"M.","family":"Correia","sequence":"first","affiliation":[]},{"given":"N.F.","family":"Neves","sequence":"additional","affiliation":[]},{"given":"P.","family":"Verissimo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60042-6_7","article-title":"The Rampart toolkit for building high-integrity services","volume":"938","author":"reiter","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/3-540-37795-6_20","article-title":"Uncertainty and predictability: Can they be reconciled?","volume":"2584","author":"veri?ssimo","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209933"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1024739"},{"key":"18","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-36080-8_5","article-title":"Solving agreement problems with weak ordering oracles","author":"pedone","year":"2002","journal-title":"Proceedings of the Fourth European Dependable Computing Conference"},{"key":"24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/3-540-45177-3_1","article-title":"Intrusion-tolerant architectures: Concepts and design","volume":"2677","author":"veri?ssimo","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"15","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"16","first-page":"507","article-title":"The SecureGroup communication system","author":"moser","year":"2000","journal-title":"Proceedings of the IEEE Information Survivability Conference"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596799"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/503339.503341"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/46.1.16"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/357162.357163"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028897"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"10","article-title":"A modular approach to fault-tolerant broadcasts and related problems","volume":"tr94 1425","author":"hadzilacos","year":"1994","journal-title":"Technical Report"},{"key":"7","article-title":"The design of a COTS real-time distributed security kernel","volume":"1","author":"correia","year":"2001","journal-title":"DI\/FCUL TR"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2004.1353018"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180168"},{"key":"4","article-title":"DIAPM-RTAI position paper","author":"cloutier","year":"2000","journal-title":"Real-Time Linux Workshop"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"8","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-36080-8_21","article-title":"The design of a COTS real-time distributed security kernel","author":"correia","year":"2002","journal-title":"Proceedings of the Fourth European Dependable Computing Conference"}],"event":{"name":"Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.","location":"Florianpolis, Brazil","start":{"date-parts":[[2004,10,18]]},"end":{"date-parts":[[2004,10,20]]}},"container-title":["Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9361\/29724\/01353018.pdf?arnumber=1353018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:42:30Z","timestamp":1497620550000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1353018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/reldis.2004.1353018","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}