R Kishore - Proceedings of the 26th International Conference on …, 2025 - dl.acm.org
In a given graph with two designated nodes, namely the S ender and the R eceiver, an
adversary can corrupt up to any t nodes (except for S and R) of its choice in an Omission …