{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:49:11Z","timestamp":1742402951587},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1109\/srds.2006.40","type":"proceedings-article","created":{"date-parts":[[2006,12,20]],"date-time":"2006-12-20T16:24:59Z","timestamp":1166631899000},"page":"39-50","source":"Crossref","is-referenced-by-count":11,"title":["Reliably Executing Tasks in the Presence of Untrusted Entities"],"prefix":"10.1109","author":[{"given":"Antonio","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Luis","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Agustin","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Chryssis","family":"Georgiou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480103434063"},{"year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/5992.895191"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2003.07.001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/24.106783"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103459"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240050306"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.48"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5210-6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/18.2626"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704440442"},{"year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/E-SCIENCE.2005.51"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2004.14"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722154"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/18.312190"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791195877"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796310102"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793255527"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1990.93959"},{"key":"9","first-page":"490","article-title":"Brief Announcement: Reliably executing tasks in the presence of malicious processors","author":"ferna?ndez","year":"2005","journal-title":"Proc of the 19th International Symposium on Distributed Computing (DISC 2005)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.06.034"}],"event":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems","start":{"date-parts":[[2006,10,2]]},"location":"Leeds","end":{"date-parts":[[2006,10,4]]}},"container-title":["2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4032454\/4032455\/04032467.pdf?arnumber=4032467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T20:05:29Z","timestamp":1550520329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4032467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/srds.2006.40","relation":{},"subject":[],"published":{"date-parts":[[2006,10]]}}}