{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:06:24Z","timestamp":1742965584834,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_13","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"155-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems"],"prefix":"10.1007","author":[{"given":"Christian","family":"Gottron","sequence":"first","affiliation":[]},{"given":"Sonja","family":"Bergstr\u00e4\u00dfer","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Steinmetz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Gottron, C., et al.: A cross-layer approach towards robustness of mobile Peer-to-Peer networks. In: 7th IEEE International Workshop on Wireless and Sensor Networks Security (2011)","DOI":"10.1109\/MASS.2011.75"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-45748-8_25","volume-title":"Peer-to-Peer Systems","author":"E Sit","year":"2002","unstructured":"Sit, E., Morris, R.: Security considerations for Peer-to-Peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261\u2013269. Springer, Heidelberg (2002)"},{"key":"13_CR3","unstructured":"Wang, P., et al.: Myrmic: secure and robust DHT routing. Technical report, University of Minnesota (2006)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Needels, K., Kwon, M.: Secure routing in Peer-to-Peer distributed hash tables. In: 24th ACM Symposium on Applied Computing (2009)","DOI":"10.1145\/1529282.1529292"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Castro, M., et al.: Secure routing for structured Peer-to-Peer overlay networks. In: Proceedings of 5th Symposium on Operating Systems Design and Implementation (2002)","DOI":"10.1145\/1060289.1060317"},{"issue":"6","key":"13_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MIC.2005.117","volume":"9","author":"MS Artigas","year":"2005","unstructured":"Artigas, M.S., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50\u201357 (2005). (IEEE Press, New York)","journal-title":"IEEE Internet Comput."},{"key":"13_CR7","unstructured":"Kapadia, A., Triandopoulos, N.: Halo: high-assurance locate for distributed hash tables. In: 15th Annual Network and Distributed System Security Symposium (2008)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-79705-0_4","volume-title":"Agents and Peer-to-Peer Computing","author":"B-S Roh","year":"2008","unstructured":"Roh, B.-S., Kwon, O.-H., Je Hong, S., Kim, J.: The exclusion of malicious routing peers in structured P2P systems. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 43\u201350. Springer, Heidelberg (2008)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-540-85451-7_65","volume-title":"Euro-Par 2008 Parallel Processing","author":"M S\u00e0nchez-Artigas","year":"2008","unstructured":"S\u00e0nchez-Artigas, M., Garc\u00eda-L\u00f3pez, P., Skarmeta, A.F.G.: Secure forwarding in DHTs - is redundancy the key to robustness? In: Luque, E., Margalef, T., Ben\u00edtez, D. (eds.) Euro-Par 2008. LNCS, vol. 5168, pp. 611\u2013621. Springer, Heidelberg (2008)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking (2000)","DOI":"10.1145\/345910.345955"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Gottron, C., et al.: A cluster-based locality-aware mobile Peer-to-Peer architecture. In: 8th International Workshop on Mobile Peer-to-Peer Computing (2012)","DOI":"10.1109\/PerComW.2012.6197593"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Rowstron, A.I.T., Druschel, P.: Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"13_CR13","unstructured":"Gottron, C.: Security in mobile Peer-to-Peer architectures - introducing mechanisms to increase the robustness of overlay routing algorithms of Mobile-Peer-to-Peer architectures. Dissertation, Technische Universit\u00e4t Darmstadt (2013)"},{"key":"13_CR14","volume-title":"Modeling and Tools for Network Simulation","author":"A Varga","year":"2010","unstructured":"Varga, A.: OMNeT++. In: Wehrle, K., G\u00fcnes, M.M., Gross, J. (eds.) Modeling and Tools for Network Simulation. Springer, Heidelberg (2010)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:42:55Z","timestamp":1676410975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}