{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:40:23Z","timestamp":1729669223600,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nca.2016.7778617","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:48:10Z","timestamp":1481575690000},"page":"199-203","source":"Crossref","is-referenced-by-count":3,"title":["Exploiting universal redundancy"],"prefix":"10.1109","author":[{"given":"Ali","family":"Shoker","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1813654.1813655"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859718"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"ref13","article-title":"Distributed trust: Supporting faulttolerance and attack-tolerance","author":"schneider","year":"2004","journal-title":"Tech Rep"},{"key":"ref14","article-title":"N-variant systems: A secretless framework for security through diversity","author":"cox","year":"2006","journal-title":"Proceedings of the 15th Conference on USENIX Security Symposium-Volume 15 Ser USENIX-SS'06"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84800-015-5","author":"ren","year":"2008","journal-title":"Distributed Consensus in Multi-Vehicle Cooperative Control"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2455.2457"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/5925.5931"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778617"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.4324\/9780203774441","author":"cohen","year":"2013","journal-title":"Applied Multiple Regression\/Correlation Analysis for the Behavioral Sciences"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294267"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"journal-title":"How Practical are Intrusion-Tolerant Distributed Systems?","year":"2006","author":"obelheiro","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/311531.311532"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.84898"},{"key":"ref9","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"chen","year":"0"},{"key":"ref20","first-page":"173","article-title":"Practical byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proceedings of the third symposium on operating systems design and implementation ser OSDI '99"},{"journal-title":"Program website","year":"2015","key":"ref22"},{"key":"ref21","first-page":"82","article-title":"From consensus to atomic broadcast: Time-free byzantine-resistant protocols without signatures","volume":"49","author":"correia","year":"2006","journal-title":"The ComputerJ"},{"journal-title":"Erlang Programming","year":"2009","author":"cesarini","key":"ref23"}],"event":{"name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2016,10,31]]},"location":"Cambridge, Boston, MA, USA","end":{"date-parts":[[2016,11,2]]}},"container-title":["2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764659\/7778571\/07778617.pdf?arnumber=7778617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T08:54:27Z","timestamp":1568624067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/nca.2016.7778617","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}