{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:43Z","timestamp":1750220383203,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR","award":["DESCARTES,FREDDA"],"award-info":[{"award-number":["DESCARTES,FREDDA"]}]},{"name":"ISF","award":["1078\/17"],"award-info":[{"award-number":["1078\/17"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3465084.3467936","type":"proceedings-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T21:09:28Z","timestamp":1627074568000},"page":"415-425","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Topology of Randomized Symmetry-Breaking Distributed Computing"],"prefix":"10.1145","author":[{"given":"Pierre","family":"Fraigniaud","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Paris and CNRS, Paris, France"}]},{"given":"Ran","family":"Gelles","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat-Gan, Israel"}]},{"given":"Zvi","family":"Lotker","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat-Gan, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218002"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1075"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/800141.804655"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/48014.48247"},{"key":"e_1_3_2_2_5_1","volume-title":"Symmetry Breaking in Anonymous Networks: Characterizations. In Fourth Israel Symposium on Theory of Computing and Systems, ISTCS","author":"Boldi Paolo","year":"1996","unstructured":"Paolo Boldi , Shella Shammah , Sebastiano Vigna , Bruno Codenotti , Peter Gemmell , and Janos Simon . 1996 . Symmetry Breaking in Anonymous Networks: Characterizations. In Fourth Israel Symposium on Theory of Computing and Systems, ISTCS 1996. IEEE Computer Society, 16--26. Paolo Boldi, Shella Shammah, Sebastiano Vigna, Bruno Codenotti, Peter Gemmell, and Janos Simon. 1996. Symmetry Breaking in Anonymous Networks: Characterizations. In Fourth Israel Symposium on Theory of Computing and Systems, ISTCS 1996. IEEE Computer Society, 16--26."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167119"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-012-0163-y"},{"volume-title":"On the Amount of Randomness Needed in Distributed Computations. In OPODIS '97","author":"Codenotti B.","key":"e_1_3_2_2_8_1","unstructured":"B. Codenotti , P. Gemmell , P. Pudl\u00e1k , and J. Simon . 1997 . On the Amount of Randomness Needed in Distributed Computations. In OPODIS '97 . B. Codenotti, P. Gemmell, P. Pudl\u00e1k, and J. Simon. 1997. On the Amount of Randomness Needed in Distributed Computations. In OPODIS '97."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611478"},{"key":"e_1_3_2_2_10_1","unstructured":"Euclid. [n.d.]. ((Elements). 300(?) BC. Book 7.  Euclid. [n.d.]. ((Elements). 300(?) BC. Book 7."},{"volume-title":"Reasoning about knowledge","author":"Fagin Ronald","key":"e_1_3_2_2_11_1","unstructured":"Ronald Fagin , Yoram Moses , Joseph Y. Halpern , and Moshe Y Vardi . 2003. Reasoning about knowledge . MIT press . Ronald Fagin, Yoram Moses, Joseph Y. Halpern, and Moshe Y Vardi. 2003. Reasoning about knowledge. MIT press."},{"key":"e_1_3_2_2_12_1","volume-title":"Chapter Two: Probability Measure, 15--62. https:\/\/doi.org\/10.1002\/9781118593103.ch02","author":"Tudor Ciprian","year":"2014","unstructured":"Ciprian Tudor (Eds.). 2014 . Handbook of Probability. John Wiley & Sons, Ltd , Chapter Two: Probability Measure, 15--62. https:\/\/doi.org\/10.1002\/9781118593103.ch02 Ciprian Tudor (Eds.). 2014. Handbook of Probability. John Wiley & Sons, Ltd, Chapter Two: Probability Measure, 15--62. https:\/\/doi.org\/10.1002\/9781118593103.ch02"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/357195.357200"},{"volume-title":"Distributed Computing Through Combinatorial Topology. Morgan Kaufmann","author":"Herlihy Maurice","key":"e_1_3_2_2_14_1","unstructured":"Maurice Herlihy , Dmitry Kozlov , and Sergio Rajsbaum . 2014. Distributed Computing Through Combinatorial Topology. Morgan Kaufmann , Boston . https:\/\/doi.org\/10.1016\/B978-0-12-404578-1 Maurice Herlihy, Dmitry Kozlov, and Sergio Rajsbaum. 2014. Distributed Computing Through Combinatorial Topology. Morgan Kaufmann, Boston. https:\/\/doi.org\/10.1016\/B978-0-12-404578-1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167125"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(90)90004-2"},{"volume-title":"Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing (PODC '85)","author":"Ralph","key":"e_1_3_2_2_17_1","unstructured":"Ralph E. Johnson and Fred B. Schneider. 1985. Symmetry and Similarity in Distributed Systems . In Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing (PODC '85) . 13--22. https:\/\/doi.org\/10.1145\/323596.323598 Ralph E. Johnson and Fred B. Schneider. 1985. Symmetry and Similarity in Distributed Systems. In Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing (PODC '85). 13--22. https:\/\/doi.org\/10.1145\/323596.323598"},{"volume-title":"Factoring RSA Keys in the IoT Era. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 184--189","author":"Kilgallin J.","key":"e_1_3_2_2_18_1","unstructured":"J. Kilgallin and R. Vasko . 2019 . Factoring RSA Keys in the IoT Era. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 184--189 . J. Kilgallin and R. Vasko. 2019. Factoring RSA Keys in the IoT Era. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 184--189."},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 7th IFIP congress","author":"Lann G\u00e9rard Le","year":"1977","unstructured":"G\u00e9rard Le Lann . 1977 . Distributed Systems-Towards a Formal Approach . In Proceedings of the 7th IFIP congress ( Toronto, Canada). International Federation for Information Processing, 155--160. G\u00e9rard Le Lann. 1977. Distributed Systems-Towards a Formal Approach. In Proceedings of the 7th IFIP congress (Toronto, Canada). International Federation for Information Processing, 155--160."},{"key":"e_1_3_2_2_20_1","unstructured":"John Matherly. 2015. Duplicate SSH Keys Everywhere. [online] https:\/\/blog.shodan.io\/duplicate-ssh-keys-everywhere\/.  John Matherly. 2015. Duplicate SSH Keys Everywhere. [online] https:\/\/blog.shodan.io\/duplicate-ssh-keys-everywhere\/."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591853"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-7315(90)90074-Y"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167122"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1065"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/2371045"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.481599"}],"event":{"name":"PODC '21: ACM Symposium on Principles of Distributed Computing","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Virtual Event Italy","acronym":"PODC '21"},"container-title":["Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465084.3467936","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465084.3467936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:25Z","timestamp":1750191505000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465084.3467936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":26,"alternative-id":["10.1145\/3465084.3467936","10.1145\/3465084"],"URL":"https:\/\/doi.org\/10.1145\/3465084.3467936","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}