{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:45Z","timestamp":1725551865744},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305101"},{"type":"electronic","value":"9783540322771"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590354_97","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:20:28Z","timestamp":1132035628000},"page":"767-775","source":"Crossref","is-referenced-by-count":1,"title":["Anonymous Communication Systems in P2P Network with Random Agent Nodes"],"prefix":"10.1007","author":[{"given":"Byung Ryong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ki Chang","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"97_CR1","unstructured":"The Freenet Project, http:\/\/freenet.sourceforge.net\/"},{"key":"97_CR2","unstructured":"The Gnutella Protocol Specification v0.41 Document Revision 1.2, http:\/\/rfc.gnutella.sourceforge.net\/developer\/stable\/index.html\/"},{"key":"97_CR3","doi-asserted-by":"crossref","unstructured":"Hildrum, K., Kubiatowicz, J., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network, Theory of Computing Systems (2004)","DOI":"10.1007\/s00224-004-1146-6"},{"key":"97_CR4","doi-asserted-by":"crossref","unstructured":"Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications (2004)","DOI":"10.1109\/JSAC.2003.818784"},{"key":"97_CR5","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications table of contents (2001)","DOI":"10.1145\/383059.383072"},{"key":"97_CR6","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Transactions on Networking (2003)","DOI":"10.1109\/TNET.2002.808407"},{"key":"97_CR7","doi-asserted-by":"crossref","unstructured":"Daswani, N., Garcia-Molina, H.: Query-flood DoS attacks in gnutella. In: Proceedings of the t e 9th ACM conference on Computer and communications security table of contents (2002)","DOI":"10.1145\/586110.586136"},{"key":"97_CR8","doi-asserted-by":"crossref","unstructured":"Gummadi, P.K., Saroiu, S., Gribble, S.D.: A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review (2002)","DOI":"10.1145\/510726.510756"},{"key":"97_CR9","unstructured":"MUTE: Simple, Anonymous File Sharing, http:\/\/mute-net.sourceforge.net\/"},{"key":"97_CR10","unstructured":"Bono, S.C., Soghoian, C.A., Monrose, F.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004)"},{"key":"97_CR11","unstructured":"Reed, M.G., Syverson, P.F.: Onion Routing. In: Proceeding of AIPA 1999 (1999)"},{"key":"97_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"97_CR13","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. In: ACM Transactions on Information and System Security, TISSEC 1998 (1998)","DOI":"10.1145\/290163.290168"},{"key":"97_CR14","unstructured":"Gnutella Developer Forum, http:\/\/groups.yahoo.com\/group\/the_gdf\/"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590354_97.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:02:15Z","timestamp":1605625335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590354_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305101","9783540322771"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11590354_97","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}