{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:19Z","timestamp":1750308379963,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,16]],"date-time":"2012-07-16T00:00:00Z","timestamp":1342396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,16]]},"DOI":"10.1145\/2332432.2332492","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T14:38:27Z","timestamp":1342708707000},"page":"319-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Byzantine broadcast in point-to-point networks using local linear coding"],"prefix":"10.1145","author":[{"given":"Guanfeng","family":"Liang","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Nitin H.","family":"Vaidya","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_16"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1802614.1802632"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/166961.167018"},{"key":"e_1_3_2_1_4_1","volume-title":"Communications in Information and Systems","author":"Cai N.","year":"2006","unstructured":"N. Cai and R. W. Yeung . Network error correction, part II: Lower bounds . Communications in Information and Systems , 2006 . N. Cai and R. W. Yeung. Network error correction, part II: Lower bounds. Communications in Information and Systems, 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov . Practical Byzantine fault tolerance . In USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 1999 . M. Castro and B. Liskov. Practical Byzantine fault tolerance. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90004-Y"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/323596.323602"},{"key":"e_1_3_2_1_8_1","volume-title":"Byzantine modification detection in multicast networks using randomized network coding (extended version). Technical report, (http:\/\/www.its.caltech.edu\/tho\/multicast.ps)","author":"Ho T.","year":"2004","unstructured":"T. Ho , B. Leong , R. Koetter , M. Medard , M. Effros , and D. Karger . Byzantine modification detection in multicast networks using randomized network coding (extended version). Technical report, (http:\/\/www.its.caltech.edu\/tho\/multicast.ps) , 2004 . T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger. Byzantine modification detection in multicast networks using randomized network coding (extended version). Technical report, (http:\/\/www.its.caltech.edu\/tho\/multicast.ps), 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.78"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835698.1835798"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935257"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993809"},{"key":"e_1_3_2_1_15_1","volume-title":"June 2011 (revised","author":"Liang G.","year":"2012","unstructured":"G. Liang and N. Vaidya . Byzantine broadcast in point-to-point networks using local linear coding. Technical report, arXiv (http:\/\/arxiv.org\/abs\/1106.1845) , June 2011 (revised May 2012 ). G. Liang and N. Vaidya. Byzantine broadcast in point-to-point networks using local linear coding. Technical report, arXiv (http:\/\/arxiv.org\/abs\/1106.1845), June 2011 (revised May 2012)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(00)00066-2"},{"key":"e_1_3_2_1_17_1","volume-title":"Combinatorial Optimization: Algorithms and Complexity","author":"Papadimitriou C. H.","year":"1998","unstructured":"C. H. Papadimitriou and K. Steiglitz . Combinatorial Optimization: Algorithms and Complexity . Courier Dover Publications , 1998 . C. H. Papadimitriou and K. Steiglitz. Combinatorial Optimization: Algorithms and Complexity. Courier Dover Publications, 1998."},{"key":"e_1_3_2_1_18_1","volume-title":"Communication optimal multi-valued asynchronous Byzantine agreement with optimal resilience. Cryptology ePrint Archive","author":"Patra A.","year":"2009","unstructured":"A. Patra and C. P. Rangan . Communication optimal multi-valued asynchronous Byzantine agreement with optimal resilience. Cryptology ePrint Archive , 2009 . A. Patra and C. P. Rangan. Communication optimal multi-valued asynchronous Byzantine agreement with optimal resilience. Cryptology ePrint Archive, 2009."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_20_1","volume-title":"Operating System Concepts","author":"Silberschatz A.","year":"1994","unstructured":"A. Silberschatz , P. B. Galvin , and G. Gagne . Operating System Concepts , chapter 17 Distributed File Systems. Addison-Wesley , 1994 . A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, chapter 17 Distributed File Systems. Addison-Wesley, 1994."}],"event":{"name":"PODC '12: ACM Symposium on Principles of Distributed Computing","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory","INESC-ID INESC-ID Lisboa"],"location":"Madeira Portugal","acronym":"PODC '12"},"container-title":["Proceedings of the 2012 ACM symposium on Principles of distributed computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2332432.2332492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2332432.2332492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:44:39Z","timestamp":1750268679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2332432.2332492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,16]]},"references-count":20,"alternative-id":["10.1145\/2332432.2332492","10.1145\/2332432"],"URL":"https:\/\/doi.org\/10.1145\/2332432.2332492","relation":{},"subject":[],"published":{"date-parts":[[2012,7,16]]},"assertion":[{"value":"2012-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}