{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:21:20Z","timestamp":1773760880165,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319289090","type":"print"},{"value":"9783319289106","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28910-6_23","type":"book-chapter","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T10:49:44Z","timestamp":1453978184000},"page":"257-266","source":"Crossref","is-referenced-by-count":2,"title":["Towards Secure Distributed Hash Table"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Naftaly H.","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Bazzi, R.A., Konjevod, G.: On the establishment of distinct identities in overlay networks. In: Distributed Computing, vol. 19 (2007)","DOI":"10.1007\/s00446-006-0012-y"},{"key":"23_CR2","unstructured":"Borisov, N.: Computational puzzles as sybil defenses. In: 2006 Sixth IEEE International Conference on Peer-to-Peer Computing, P2P 2006. IEEE (2006)"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/844128.844156","volume":"36","author":"M Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Operating Syst. Rev. 36, 299\u2013314 (2002)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"23_CR4","unstructured":"Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer systems, vol. 6 (2003)"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/502059.502054","volume":"35","author":"F Dabek","year":"2001","unstructured":"Dabek, F., Kaashoek, F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. ACM SIGOPS Operating Syst. Rev. 35, 202\u2013215 (2001)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/11555827_18","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G Danezis","year":"2005","unstructured":"Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-resistant DHT routing. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305\u2013318. Springer, Heidelberg (2005)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-39989-6_23","volume-title":"Distributed Computing","author":"K Hildrum","year":"2003","unstructured":"Hildrum, K., Kubiatowicz, J.D.: Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In: Fich, F.E. (ed.) DISC 2003. LNCS, vol. 2848, pp. 321\u2013336. Springer, Heidelberg (2003)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A Peer-to-Peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002)"},{"key":"23_CR9","unstructured":"Minsky, N.H.: Law Governed Interaction (LGI): A Distributed Coordination and Control Mechanism (An Introduction, and a Reference Manual), Rutgers, February 2006. \n                    http:\/\/www.moses.rutgers.edu\/"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Pappas, V., Massey, D., Terzis, A., Zhang, L.: A comparative study of the DNS design with DHT-based alternatives. In: INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.207"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network, vol. 31. ACM (2001)","DOI":"10.1145\/964723.383072"},{"issue":"4","key":"23_CR12","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1090191.1080102","volume":"35","author":"Sean Rhea","year":"2005","unstructured":"Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., Harlan, Y.: OpenDHT: a public DHT service and its uses. In: ACM SIGCOMM Computer Communication Review, vol. 35 (2005)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans. Netw. 11, 17\u201332 (2003)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Urdaneta, G., Pierre, G., Van Steen, M.: A survey of DHT security techniques. ACM Comput. Surv. (CSUR), 43 (2011)","DOI":"10.1145\/1883612.1883615"},{"key":"23_CR16","unstructured":"Wang, H., Zhu, Y., Hu, Y.: An efficient and secure peer-to-peer overlay network. In: 2005 IEEE Conference on Local Computer Networks 30th Anniversary. IEEE (2005)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Z., Minsky, N.: Establishing global policies over decentralized online social networks. In: Proceedings of the 9th IEEE International Workshop on Trusted Collaboration, October 2014","DOI":"10.4108\/icst.collaboratecom.2014.257584"},{"key":"23_CR18","unstructured":"Wang, Z., Minsky, N.: Regularity based decentralized social networks. In: Proceedings of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS2014), October 2014"},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"Y Haifeng","year":"2006","unstructured":"Haifeng, Y., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36, 267\u2013278 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications, and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28910-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:49:24Z","timestamp":1559375364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28910-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319289090","9783319289106"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28910-6_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}