Reliably Executing Tasks in the Presence of Malicious Processors | Publicación