“…Finally, verification mechanisms a la proof-labeling schemes were used in other contexts, including the congested clique [27], wait-free computing [20], failure detectors [21], anonymous networks [17], and mobile computing [7,19]. For more references to work related to distributed verification, or distributed decision in general, see the survey [14].…”