{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:05:16Z","timestamp":1766441116423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,16]],"date-time":"2012-07-16T00:00:00Z","timestamp":1342396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,16]]},"DOI":"10.1145\/2332432.2332490","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T14:38:27Z","timestamp":1342708707000},"page":"301-308","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["On the (limited) power of non-equivocation"],"prefix":"10.1145","author":[{"given":"Allen","family":"Clement","sequence":"first","affiliation":[{"name":"MPI-SWS, Kaiserslautern - Saarbruecken, Germany"}]},{"given":"Flavio","family":"Junqueira","sequence":"additional","affiliation":[{"name":"Yahoo! Research, Barcelona, Spain"}]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern - Saarbruecken, Germany"}]},{"given":"Rodrigo","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Universidade Nova de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2012,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_2"},{"key":"e_1_3_2_1_2_1","first-page":"188","volume-title":"Proc. 4th International Workshop Information Security Applications (WISA '03)","author":"Avoine G.","year":"2003","unstructured":"G. Avoine and S. Vaudenay . Optimal Fair Exchange with Guardian Angels . In Proc. 4th International Workshop Information Security Applications (WISA '03) , pages 188 -- 202 , 2003 . G. Avoine and S. Vaudenay. Optimal Fair Exchange with Guardian Angels. In Proc. 4th International Workshop Information Security Applications (WISA '03), pages 188--202, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806743"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.9732"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/323596.323602"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_3"},{"key":"e_1_3_2_1_12_1","volume-title":"USA","author":"Hadzilacos V.","year":"1994","unstructured":"V. Hadzilacos and S. Toueg . A Modular Approach to Fault-Tolerant Broadcasts and Related Problems. Technical report, Ithaca, NY , USA , 1994 . V. Hadzilacos and S. Toueg. A Modular Approach to Fault-Tolerant Broadcasts and Related Problems. Technical report, Ithaca, NY, USA, 1994."},{"key":"e_1_3_2_1_13_1","first-page":"232","volume-title":"Renesse. Making Distributed Applications Robust. In 11th International Conference Principles of Distributed Systems (OPODIS '07)","author":"Ho C.","year":"2007","unstructured":"C. Ho , D. Dolev , and R. van Renesse. Making Distributed Applications Robust. In 11th International Conference Principles of Distributed Systems (OPODIS '07) , pages 232 -- 246 , 2007 . C. Ho, D. Dolev, and R. van Renesse. Making Distributed Applications Robust. In 11th International Conference Principles of Distributed Systems (OPODIS '07), pages 232--246, 2007."},{"key":"e_1_3_2_1_14_1","first-page":"175","volume-title":"4th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08)","author":"Ho C.","year":"2008","unstructured":"C. Ho , R. van Renesse , M. Bickford , and D. Dolev . Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures . In 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08) , pages 175 -- 188 , 2008 . C. Ho, R. van Renesse, M. Bickford, and D. Dolev. Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures. In 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08), pages 175--188, 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"TrInc: Small Trusted Hardware for Large Distributed Systems. In 6th USENIX Symposium on Networked Systems Design and Implementation (NDSI '09)","author":"Levin D.","year":"2009","unstructured":"D. Levin , J. R. Douceur , J. R. Lorch , and T. Moscibroda . TrInc: Small Trusted Hardware for Large Distributed Systems. In 6th USENIX Symposium on Networked Systems Design and Implementation (NDSI '09) , pages 1 -- 14 , 2009 . D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. In 6th USENIX Symposium on Networked Systems Design and Implementation (NDSI '09), pages 1--14, 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122480.1122497"}],"event":{"name":"PODC '12: ACM Symposium on Principles of Distributed Computing","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory","INESC-ID INESC-ID Lisboa"],"location":"Madeira Portugal","acronym":"PODC '12"},"container-title":["Proceedings of the 2012 ACM symposium on Principles of distributed computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2332432.2332490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2332432.2332490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:44:39Z","timestamp":1750268679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2332432.2332490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,16]]},"references-count":18,"alternative-id":["10.1145\/2332432.2332490","10.1145\/2332432"],"URL":"https:\/\/doi.org\/10.1145\/2332432.2332490","relation":{},"subject":[],"published":{"date-parts":[[2012,7,16]]},"assertion":[{"value":"2012-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}