{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:48:46Z","timestamp":1725486526570},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441779"},{"type":"electronic","value":"9783540457459"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45745-3_31","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T14:29:18Z","timestamp":1181399358000},"page":"335-349","source":"Crossref","is-referenced-by-count":3,"title":["Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System"],"prefix":"10.1007","author":[{"given":"Timothy","family":"Roscoe","sequence":"first","affiliation":[]},{"given":"Steven","family":"Hand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,24]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Steven Hand and Timothy Roscoe. Mnemosyne: Peer-to-Peer Steganographic Storage. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.","DOI":"10.1007\/3-540-45748-8_13"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46\u201366, July 2000.","DOI":"10.1007\/3-540-44702-4_4"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, pages 67\u201395, July 2000.","DOI":"10.1007\/3-540-44702-4_5"},{"key":"31_CR4","unstructured":"Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceeding of the 9th USENIX Security Symposium, pages 59\u201372, August 2000."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"F.S. Annexstein, K.A. Berman, and M. Jovanovic. Latency Effects on Reachability in Large-scale Peer-to-Peer Networks. In Proceedings Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA), 2001.","DOI":"10.1145\/378580.378594"},{"key":"31_CR6","unstructured":"Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report UCB\/\/CSD-01-1141, U. C. Berkeley, April 2000."},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"S Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.","DOI":"10.1145\/383059.383072"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.","DOI":"10.1145\/383059.383071"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 18th IFIP\/ACM Internation Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November 2001.","DOI":"10.1007\/3-540-45518-3_18"},{"key":"31_CR10","unstructured":"John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"S. Zhuang, B. Zhao, A. Joseph, R. Katz, and J. Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination. In Proceedings of the Eleventh International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001), June 2001.","DOI":"10.1145\/378344.378347"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.","DOI":"10.1145\/502034.502054"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Anthony Rowstron and Peter Druschel. Storage management and caching in PAST, a large scale persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.","DOI":"10.1145\/502034.502053"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Antony Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel. SCRIBE: The design of a large-scale event notification infrastructure. In Proceedings of the Third International Workshop on Networked Group Communications (NGC2001), London, UK, November 2001.","DOI":"10.1007\/3-540-45546-9_3"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Ross Anderson, Roger Needham, and Adi Shamir. The Steganographic File System. In IWIH: International Workshop on Information Hiding, 1998.","DOI":"10.1007\/3-540-49380-8_6"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Matei Ripeanu and Ian Foster. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.","DOI":"10.1007\/3-540-45748-8_8"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Bryce Wilcox-O\u2019Hearn. Experiences Deploying a Large-Scale Emergent Network. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.","DOI":"10.1007\/3-540-45748-8_10"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Qin Lv, Sylvia Ratnasamy, and Scott Shenker. Can Heterogeneity Make Gnutella Scalable? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.","DOI":"10.1007\/3-540-45748-8_9"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"John R. Douceur. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Advances in Cryptology-CRYPTO\u2019 88 Proceedings, pages 319\u2013327, 1989.","DOI":"10.1007\/0-387-34799-2_25"},{"issue":"2","key":"31_CR21","first-page":"335","volume":"36","author":"M. Rabin","year":"1989","unstructured":"M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Communications of the ACM, 36(2):335\u2013348, April 1989.","journal-title":"Communications of the ACM"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8). ACM Press, August 2001.","DOI":"10.1145\/501983.502011"},{"key":"31_CR23","unstructured":"Peter Key. Service differentiation: Congestion pricing, brokers and bandwidth futures. In Proceedings of the Ninth International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1999), June 1999."}],"container-title":["Lecture Notes in Computer Science","Web Engineering and Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45745-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T20:06:58Z","timestamp":1556482018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45745-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441779","9783540457459"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45745-3_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}