{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:19Z","timestamp":1726004299950},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_7","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"122-138","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won\u2019t Do"],"prefix":"10.1007","author":[{"given":"Bernd","family":"Pr\u00fcnster","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Ziegler","sequence":"additional","affiliation":[]},{"given":"Chrisitan","family":"Kollmann","sequence":"additional","affiliation":[]},{"given":"Bojan","family":"Suzic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Baumgart, I., Mies, S.: S\/Kademlia: a practicable approach towards secure key-based routing. In: 2007 International Conference on Parallel and Distributed Systems, pp. 1\u20138, December 2007","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"7_CR2","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3). July 2014. https:\/\/ipfs.io\/ipfs\/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX\/ipfs.draft3.pdf (visited on 07\/04\/2017)"},{"key":"7_CR3","unstructured":"Cohen, B.: The BitTorrent Protocol Specification, 11 October 2013. http:\/\/www.bittorrent.org\/beps\/bep_0003.html . Accessed 24 Apr 2017"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Fantacci, R., et al.: Avoiding eclipse attacks on Kad\/Kademlia: an identity based approach. In: 2009 IEEE International Conference on Communications, pp. 1\u20135, June 2009","DOI":"10.1109\/ICC.2009.5198772"},{"key":"7_CR6","unstructured":"Heilman,E., et al.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129\u2013144. USENIX Association, Washington, August 2015"},{"key":"7_CR7","unstructured":"International Organization for Standardization: ISO\/IEC 15408\u20131:2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model. Geneva, Switzerland, 15 January 2014"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"7_CR9","unstructured":"Levine, B.N., Shields, C., Margolin, N.B.: A survey of solutions to the sybil attack. Technical report 2006\u2013052. University of Massachusetts Amherst, Amherst, October 2006"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Li, F., et al.: SybilControl: practical sybil defense with computational puzzles. In: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, pp. 67\u201378. ACM, Raleigh (2012)","DOI":"10.1145\/2382536.2382548"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Mazi\u00e8res, D., Frans Kaashoek, M.: Escaping the evils of centralized control with self-certifying pathnames. In: Proceedings of the 8th ACM SIGOPS European Workshop on Support for Composing Distributed Applications, pp. 118\u2013125. ACM, Sintra (1998)","DOI":"10.1145\/319195.319213"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., Henderson, T.: Host identity protocol. RFC 5201, April 2008. http:\/\/www.rfc-editor.org\/rfc\/rfc5201.txt . Accessed 05\/04\/2017","DOI":"10.17487\/rfc5201"},{"key":"7_CR15","unstructured":"National Institute of Standards and Technology: SHA-3 Standard: Permutation- Based Hash and Extendable-Output Functions. FIPS PIB 202, 4 August 2015"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., et al.: A scalable content-addressable network. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2001, pp. 161\u2013172. ACM, San Diego (2001)","DOI":"10.1145\/383059.383072"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Singh, A., et al.: Defending against eclipse attacks on overlay networks. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW 11. ACM, Leuven (2004)","DOI":"10.1145\/1133572.1133613"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"Ion Stoica","year":"2001","unstructured":"Stoica, I., et al.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2001, pp. 149\u2013160. ACM, San Diego (2001)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Viswanath, B., et al.: An analysis of social network-based sybil defenses. In: Proceedings of the ACM SIGCOMM 2010 Conference, pp. 363\u2013374. ACM, New Delhi (2010)","DOI":"10.1145\/1851182.1851226"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Yu, H., et al.: SybilGuard: defending against sybil attacks via social networks. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2006, pp. 267\u2013278. ACM, Pisa (2006)","DOI":"10.1145\/1159913.1159945"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:02:27Z","timestamp":1573606947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}