{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:56:08Z","timestamp":1747810568780},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540236634"},{"type":"electronic","value":"9783540304685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30468-5_22","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T18:12:53Z","timestamp":1294855973000},"page":"337-354","source":"Crossref","is-referenced-by-count":10,"title":["FairNet \u2013 How to Counter Free Riding in Peer-to-Peer Data Structures"],"prefix":"10.1007","author":[{"given":"Erik","family":"Buchmann","sequence":"first","affiliation":[]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","first-page":"117","volume-title":"Proceedings of the ACM SIGCOMM 2001 Conference","author":"S. Ratnasamy","year":"2001","unstructured":"Ratnasamy, S., et al.: A Scalable Content-Addressable Network. In: Proceedings of the ACM SIGCOMM 2001 Conference, vol.\u00a02, pp. 117\u2013161. ACM Press, New York (2001)"},{"doi-asserted-by":"crossref","unstructured":"Ramaswamy, L., Liu, L.: Free riding: A new challenge to peer-to-peer file sharing systems (2003)","key":"22_CR2","DOI":"10.1109\/HICSS.2003.1174583"},{"key":"22_CR3","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"unstructured":"Buchegger, S., Boudec, J.Y.L.: Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. Technical Report IC\/2003\/31, EPFL, EPFL-IC-LCA CH-1015 Lausanne, Switzerland (2003)","key":"22_CR4"},{"key":"22_CR5","first-page":"87","volume-title":"Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing","author":"L. Buttyan","year":"2000","unstructured":"Buttyan, L., Hubaux, J.P.: Enforcing Service Availability in Mobile Ad-Hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 87\u201396. IEEE Press, Los Alamitos (2000)"},{"doi-asserted-by":"crossref","unstructured":"Marti et al., S.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Mobile Computing and Networking, pp. 255\u2013265 (2000)","key":"22_CR6","DOI":"10.1145\/345910.345955"},{"unstructured":"Srinivasan, V., et al.: Cooperation inWireless Ad Hoc Networks. In: Proceedings of the IEEE INFOCOM (2003)","key":"22_CR7"},{"doi-asserted-by":"crossref","unstructured":"Gokhale, S., Dasgupta, P.: Distributed Authentication for Peer-to-Peer Networks. In: Workshop on Security and Assurance in Ad hoc Networks (2003)","key":"22_CR8","DOI":"10.1109\/SAINTW.2003.1210184"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/3-540-45598-1_9","volume-title":"Electronic Commerce","author":"P. Golle","year":"2001","unstructured":"Golle, P., et al.: Incentives for Sharing in Peer-to-Peer Networks. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, p. 75. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the CIKM 2001, New York, pp. 310\u2013317 (2001)","key":"22_CR10","DOI":"10.1145\/502585.502638"},{"doi-asserted-by":"crossref","unstructured":"Padovan, B., et al.: A Prototype for an Agent based Secure Electronic Marketplace Including Reputation Tracking Mechanisms. In: HICSS (2001)","key":"22_CR11","DOI":"10.1109\/HICSS.2001.927039"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., et al.: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In: Proceedings of the ACM SIGCOMM, Conference, pp. 149\u2013160 (2001)","key":"22_CR12","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms, pp. 329\u2013350 (2001)","key":"22_CR13","DOI":"10.1007\/3-540-45518-3_18"},{"unstructured":"Zhao, B.Y., Kubiatowicz, J., Joseph, A.D.: Tapestry: an infrastructure for fault-resilient widearea location and routing. Technical Report UCB\/\/CSD-01-1141, University of California at Berkeley (2001)","key":"22_CR14"},{"unstructured":"Buchmann, E., B\u00f6hm, K.: Efficient Routing in Distributed Scalable Data Structures (in German). In: Proceedings of the 10th Conference on Database Systems for Business, Technology and Web (2003)","key":"22_CR15"},{"unstructured":"Back, A.: Hashcash \u2013 A Denial of Service Counter-Measure (2002), http:\/\/www.cypherspace.org\/~adam\/hashcash\/","key":"22_CR16"},{"doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In. In: Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS 1999), Leuven, Belgium (1999)","key":"22_CR17","DOI":"10.1007\/978-0-387-35568-9_18"},{"doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: A Reputation-Based Trust Model For Peer-To-Peer Ecommerce Communities. In: IEEE Conference on E-Commerce, CEC 2003 (2003)","key":"22_CR18","DOI":"10.1145\/779928.779972"},{"key":"22_CR19","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E. Friedman","year":"1998","unstructured":"Friedman, E., Resnick, P.: The Social Cost of Cheap Pseudonyms. Journal of Economics and Management Strategy\u00a010, 173\u2013199 (1998)","journal-title":"Journal of Economics and Management Strategy"},{"doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: The Small-World Phenomenon: An Algorithmic Perspective. In: Proceedings of the 32nd ACM Symposium on Theory of Computing (2000)","key":"22_CR20","DOI":"10.1145\/335305.335325"},{"doi-asserted-by":"crossref","unstructured":"Buchmann, E., B\u00f6hm, K.: How to Run Experiments with Large Peer-to-Peer Data Structures. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, Santa Fe, USA (2004)","key":"22_CR21","DOI":"10.1109\/IPDPS.2004.1302938"},{"doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.: Free Riding on Gnutella. First Monday 5 (2000)","key":"22_CR22","DOI":"10.5210\/fm.v5i10.792"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1145\/170035.170084","volume-title":"Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data","author":"W. Litwin","year":"1993","unstructured":"Litwin, W., Neimat, M.A., Schneider, D.A.: LH* - Linear Hashing for Distributed Files. In: Buneman, P., Jajodia, S. (eds.) Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, D.C, May 26-28, 1993, pp. 327\u2013336. ACM Press, New York (1993)"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/948109.948150","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003)","author":"B. Yang","year":"2003","unstructured":"Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In: Atluri, V., Liu, P. (eds.) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003), pp. 300\u2013310. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30468-5_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:52:48Z","timestamp":1605761568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30468-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540236634","9783540304685"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30468-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}