{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:28Z","timestamp":1725551608240},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_25","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"322-327","source":"Crossref","is-referenced-by-count":0,"title":["SPEAR: Design of a Secured Peer-to-Peer Architecture"],"prefix":"10.1007","author":[{"given":"Jaydev","family":"Misra","sequence":"first","affiliation":[]},{"given":"Pinakpani","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"http:\/\/www.napster.com"},{"key":"25_CR2","unstructured":"http:\/\/gnutella.wego.com"},{"key":"25_CR3","unstructured":"http:\/\/www.kazaa.com"},{"key":"25_CR4","first-page":"164","volume-title":"Proceedings of the 17th Symposium on Security and Privacy","author":"N. Daswani","year":"1996","unstructured":"Daswani, N., Garcia-Molina, H., Yang, B.: Decentralized Trust Management. In: Proceedings of the 17th Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Daswani, N., Garcia-Molina, H., Yang, B.: Open problems in data-sharing peer-to-peer systems. In: Proceedings of International Conference on Database Theory (2003)","DOI":"10.1007\/3-540-36285-1_1"},{"key":"25_CR6","unstructured":"Kim, Y., Mazzocchi, D., Tsudik, G.: Admission control in peer groups. In: Proceedings of IEEE International Symposium on Network Computing and Applications (NCA) (April 2003)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., Yi, J.H.: Admission control in Peer-to-Peer: design and Performance Evaluation. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986873"},{"key":"25_CR8","unstructured":"Stinson, D.: Cryptography: Theory & Practicer, 4th Printing. CRC Press, Boca Raton (1999)"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"38","author":"S.A. Theotokis","year":"2004","unstructured":"Theotokis, S.A., Spinellis, D.: A survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys\u00a038(4), 335\u2013371 (2004)","journal-title":"ACM Computing Surveys"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Winsborough, W., Li, N.: Towards practical trust negoitiation. In: Proceedings of IEEE 3rd. International Workshop on policies for distributed systems and networks (June 2002)","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"25_CR11","unstructured":"Yang, B., Garcia-Molina, H.: Comparing hybrid peer-to-peer systems. In: Proceedings of 27th Very Large Databases Conference, Roma, Italy (2001)"},{"key":"25_CR12","unstructured":"Yang, B., Garcia-Molina, H.: Designing a super-peer network. In: Proceedings International Conference on Data Engineering, pp. 49\u201360 (2003)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM transactions on Information and System Security\u00a06 (February 2003)","DOI":"10.1145\/605434.605435"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:59Z","timestamp":1619506319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11593980_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}