{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:25:58Z","timestamp":1776349558967,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540441793","type":"print"},{"value":"9783540457480","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45748-8_24","type":"book-chapter","created":{"date-parts":[[2007,10,9]],"date-time":"2007-10-09T12:29:16Z","timestamp":1191932956000},"page":"251-260","source":"Crossref","is-referenced-by-count":2153,"title":["The Sybil Attack"],"prefix":"10.1007","author":[{"given":"John R.","family":"Douceur","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"T. Aura, P. Nikander, J. Leiwo, \u201cDoS-Resistant Authentication with Client Puzzles\u201d, Cambridge Security Protocols Workshop, Springer, 2000.","DOI":"10.1007\/3-540-44810-1_22"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cRandom Oracles are Practical: A Paradigm for Designing Efficient Protocols\u201d, 1st Conference on Computer and Communications Security, ACM, 1993, pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"W. J. Bolosky, J. R. Douceur, D. Ely, M. Theimer, \u201cFeasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs\u201d, SIGMETRICS 2000, 2000, pp. 34\u201343.","DOI":"10.1145\/345063.339345"},{"key":"24_CR4","unstructured":"M. Castro, B. Liskov, \u201cPractical Byzantine Fault Tolerance\u201d, 3rd OSDI, 1999."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cUntraceable Electronic Mail, Return Addresses, and Digital Pseudonyms\u201d, CACM 4 (2), 1982.","DOI":"10.1145\/358549.358563"},{"key":"24_CR6","unstructured":"B. Chor, O. Goldreich, E. Kushilevitz, M. Sudan, \u201cPrivate Information Retrieval\u201d, 36th FOCS, 1995."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"I. Clarke, O. Sandberg, B. Wiley, T. Hong, \u201cFreenet: A Distributed Anonymous Information Storage and Retrieval System\u201d, Design Issues in Anonymity and Unobervability, ICSI, 2000.","DOI":"10.1007\/3-540-44702-4_4"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, I. Stoica, \u201cWide-Area Cooperative Storage with CFS\u201d, 18th SOSP, 2001, pp. 202\u2013215.","DOI":"10.1145\/502059.502054"},{"key":"24_CR9","unstructured":"D. Dean, A. Stubblefield, \u201cUsing Client Puzzles to Protect TLS\u201d, 10th USENIX Security Symp., 2001."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"R. Dingledine, M. Freedman, D. Molnar \u201cThe Free Haven Project: Distributed Anonymous Storage Service\u201d, Design Issues in Anonymity and Unobservability, 2000.","DOI":"10.1007\/3-540-44702-4_5"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"R. Dingledine, M. J. Freedman, D. Molnar \u201cAccountability\u201d, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O\u2019Reilly, 2001.","DOI":"10.1145\/375348.377427"},{"key":"24_CR12","unstructured":"J. S. Donath, \u201cIdentity and Deception in the Virtual Community\u201d, Communities in Cyberspace, Routledge, 1998."},{"key":"24_CR13","unstructured":"C. Ellison, \u201cEstablishing Identity Without Certification Authorities\u201d, 6th USENIX Security Symposium, 1996, pp. 67\u201376."},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, A. Shamir, \u201cZero-Knowledge Proofs of Identity\u201d, Journal of Cryptology 1 (2), 1988, pp. 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"A. Fiat, A. Shamir, \u201cHow to Prove Yourself: Practical Solutions of Identification and Signature Problems\u201d, Crypto\u2019 86, 1987, pp. 186\u2013194.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Y. Gertner, S. Goldwasser, T. Malkin, \u201cA Random Server Model for Private Information Retrieval\u201d, RANDOM\u2019 98, 1998.","DOI":"10.1007\/3-540-49543-6_17"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"A. Goldberg, P. Yianilos, \u201cTowards an Archival Intermemory\u201d, International Forum on Research and Technology Advances in Digital Libraries, IEEE, 1998, pp. 147\u2013156.","DOI":"10.1109\/ADL.1998.670389"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"J. H. Hartman, I. Murdock, T. Spalink, \u201cThe Swarm Scalable Storage System\u201d, 19th ICDCS, 1999, pp. 74\u201381.","DOI":"10.1109\/ICDCS.1999.776508"},{"key":"24_CR19","unstructured":"A. Juels, J. Brainard, \u201cClient Puzzles: A Cryptographic Defense against Connection Depletion Attacks\u201d, NDSS\u2019 99, ISOC, 1999, pp. 151\u2013165."},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"L. Lamport, R. Shostak, M. Pease, \u201cThe Byzantine Generals Problem\u201d, TPLS 4(3), 1982.","DOI":"10.1145\/357172.357176"},{"key":"24_CR21","unstructured":"K. R. Lefebvre, \u201cThe Added Value of EMBASSY in the Digital World\u201d, Wave Systems Corp. white paper, http:\/\/www.wave.com , 2000."},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"D. Mazi\u00e8res, M. Kaminsky, M. F. Kaashoek, E. Witchel, \u201cSeparating Key Management from File System Security\u201d, 17th SOSP, 1999, pp. 124\u2013139.","DOI":"10.1145\/319344.319160"},{"key":"24_CR23","unstructured":"A. J. Menezes, P. C. van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"R. C. Merkle, \u201cSecure Communications over Insecure Channels\u201d, CACM 21, 1978, pp. 294\u2013299.","DOI":"10.1145\/359460.359473"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"T. Narten, R. Draves, \u201cPrivacy Extensions for Stateless Address Autoconfiguration in IPv6\u201d, RFC 3041, 2001.","DOI":"10.17487\/rfc3041"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"K. Ohta, T. Okamoto, \u201cA Modification to the Fiat-Shamir Scheme\u201d, Crypto \u015588, 1990, pp. 232\u2013243.","DOI":"10.1007\/0-387-34799-2_17"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"M. K. Reiter, A. D. Rubin, \u201cCrowds: Anonymous Web Transactions\u201d, Transactions on Information System Security 1 (1), ACM, 1998.","DOI":"10.1145\/290163.290168"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"A. Rowstron, P. Druschel, \u201cStorage Management and Caching in PAST, a Large-Scale, Persistent Peer-to-Peer Storage Utility\u201d, 18th SOSP, 2001, pp. 188\u2013201.","DOI":"10.1145\/502059.502053"},{"key":"24_CR29","unstructured":"F. R. Schreiber, Sybil, Warner Books, 1973."},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"A. Shamir, \u201cAn Efficient Identification Scheme Based on Permuted Kernels\u201d, Crypto \u2a6d9, 1990, pp. 606\u2013609.","DOI":"10.1007\/0-387-34805-0_54"},{"key":"24_CR31","unstructured":"S. Turkle, Life on the Screen: Identity in the Age of the Internet, Simon & Schuster, 1995."},{"key":"24_CR32","unstructured":"M. Waldman, A. D. Rubin, L. F. Cranor, \u201cPublius: A Robust, Tamper-Evident Censorship-Resistant Web Publishing System\u201d, 9th USENIX Security Symposium, 2000, pp. 59\u201372."},{"issue":"8","key":"24_CR33","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.863969","volume":"33","author":"J. J. Wylie","year":"2000","unstructured":"J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kilite, P. K. Khosla, \u201cSurvivable Information Storage Systems\u201d, IEEE Computer 33 (8), IEEE, 2000, pp. 61\u201368.","journal-title":"IEEE Computer"},{"key":"24_CR34","unstructured":"P. Zimmerman, PGP User\u2019s Guide, MIT, 1994."}],"container-title":["Lecture Notes in Computer Science","Peer-to-Peer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45748-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T13:42:24Z","timestamp":1737466944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45748-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441793","9783540457480"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-540-45748-8_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}