{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:39Z","timestamp":1750309179080,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700776","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"341-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Consensus-Agnostic State-Machine Replication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6837-2861","authenticated-orcid":false,"given":"Alexander","family":"He\u00df","sequence":"first","affiliation":[{"name":"Institute of Distributed Systems, Ulm University, Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7480-9617","authenticated-orcid":false,"given":"Franz J.","family":"Hauck","sequence":"additional","affiliation":[{"name":"Institute of Distributed Systems, Ulm University, Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2937-6306","authenticated-orcid":false,"given":"Echo","family":"Mei\u00dfner","sequence":"additional","affiliation":[{"name":"Institute of Distributed Systems, Ulm University, Ulm, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1095810.1095817"},{"unstructured":"D. F. Aranha C. P. L. Gouv\u00eaa T. Markmann R. S. Wahby and K. Liao. 2022. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2658994"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-3-319-93767-0_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/SRDS53918.2021.00010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/DSN.2014.43"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/s00145-004-0314-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/571637.571640"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/859716.859718"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-642-35270-6_24"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_12_1","volume-title":"HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. In 7th Symp. on Oper. Sys. Des. & Impl. (OSDI). USENIX, 177--190","author":"Cowling James A.","year":"2006","unstructured":"James A. Cowling, Daniel S. Myers, Barbara Liskov, Rodrigo Rodrigues, and Liuba Shrira. 2006. HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. In 7th Symp. on Oper. Sys. Des. & Impl. (OSDI). USENIX, 177--190."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/42282.42283"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/PRDC53464.2021.00019"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3149.214121"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/3-540-48910-X_21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/DSN.2019.00063"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1755913.1755950"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.ijinfomgt.2013.07.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/SRDS.2016.030"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3458336.3465297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1007\/11586821_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1658357.1658358"},{"key":"e_1_3_2_1_24_1","volume-title":"6th Int. Conf. on Princ. of Distr. Sys. (OPODIS)","volume":"3","author":"Lamport Leslie","year":"2002","unstructured":"Leslie Lamport. 2002. Paxos Made Simple, Fast, and Byzantine. In 6th Int. Conf. on Princ. of Distr. Sys. (OPODIS), Vol. 3. Suger, Saint-Denis, rue Catulienne, France, 7--9."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/357172.357176"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/IPDPS.2017.29"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/RELDIS.2005.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2976749.2978399"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ICDCS.2008.94"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/322186.322188"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/HICSS.2015.250"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.3390\/ijerph18010334"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/SRDS.2006.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/3366611.3368144"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/98163.98167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/SCC.2018.00030"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/SCOPES.2016.7955539"},{"key":"e_1_3_2_1_38_1","volume-title":"BFT Protocols Under Fire. In 5th USENIX Symp. on Netw. Sys. Des. & Impl. (NSDI). USENIX Assoc., 189--204","author":"Singh Atul","year":"2008","unstructured":"Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, and Timothy Roscoe. 2008. BFT Protocols Under Fire. In 5th USENIX Symp. on Netw. Sys. Des. & Impl. (NSDI). USENIX Assoc., 189--204."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/EDCC.2012.32"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/3293611.3331591"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1016\/J.JSS.2008.12.037"}],"event":{"sponsor":["IFIP","Usenix"],"acronym":"Middleware '24","name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong"},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":41,"alternative-id":["10.1145\/3652892.3700776","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700776","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}