{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:58:38Z","timestamp":1725559118503},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_70","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T21:26:19Z","timestamp":1278537979000},"page":"617-624","source":"Crossref","is-referenced-by-count":1,"title":["Secure Identity and Location Decoupling Using Peer-to-Peer Networks"],"prefix":"10.1007","author":[{"given":"Stephen","family":"Herborn","sequence":"first","affiliation":[]},{"given":"Tim Hsin-Ting","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-30183-7_16","volume-title":"Peer-to-Peer Systems III","author":"A. Mislove","year":"2004","unstructured":"Mislove, A., Druschel, P.: Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol.\u00a03279, pp. 162\u2013172. Springer, Heidelberg (2004)"},{"unstructured":"Nikander, P., Ylitalo, J., Wall, J.: Integrating Security, Mobility, and Multi-Homing in a HIP Way. In: NDSS (2003)","key":"70_CR2"},{"doi-asserted-by":"crossref","unstructured":"Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., Walfish, M.: A Layered Naming Architecture for the Internet. In: SIGCOMM (2004)","key":"70_CR3","DOI":"10.1145\/1015467.1015505"},{"unstructured":"Walfish, M., Balakrishnan, H., Shenker, S.: Untangling the Web from DNS. In: NSDIS (2004)","key":"70_CR4"},{"doi-asserted-by":"crossref","unstructured":"Ford, B.: Unmanaged Internet Protocol: Taming the edge network management crisis. In: HotNets-II (2003)","key":"70_CR5","DOI":"10.1145\/972374.972391"},{"doi-asserted-by":"crossref","unstructured":"Castro, M., Drushel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)","key":"70_CR6","DOI":"10.1145\/1060289.1060317"},{"key":"70_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_3","volume-title":"Peer-to-Peer Systems II","author":"F. Dabek","year":"2003","unstructured":"Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a Common API for Structured Peer-to-Peer Overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Clark, D., Braden, R., Falk, A., Pingali, V.: FARA: Reorganizing the Addressing Architecture. In: ACM SIGCOMM (2003)","key":"70_CR8","DOI":"10.1145\/944769.944770"},{"doi-asserted-by":"crossref","unstructured":"Mazieres, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: SOSP (1999)","key":"70_CR9","DOI":"10.1145\/319151.319160"},{"doi-asserted-by":"crossref","unstructured":"Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R.: Looking up data in P2P systems. In: CACM (February 2003)","key":"70_CR10","DOI":"10.1145\/606272.606299"},{"key":"70_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_25","volume-title":"Peer-to-Peer Systems II","author":"J. Eriksson","year":"2003","unstructured":"Eriksson, J., Faloutsos, M., Krishnamurthy, S.: PeerNet: Pushing peer-to-peer down the stack. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Snoeren, A.C., Balakrishnan, H.: An end-to-end approach to host mobility. In: Mobicom (2000)","key":"70_CR12","DOI":"10.1145\/345910.345938"},{"doi-asserted-by":"crossref","unstructured":"Snoeren, A.C., Balakrishnan, H., Kaashoek, M.F.: Reconsidering Internet mobility. In: HotOS-VIII (2001)","key":"70_CR13","DOI":"10.1109\/HOTOS.2001.990059"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., et al.: Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE\/ACM Transactions on Networking, (February 2003)","key":"70_CR14","DOI":"10.1109\/TNET.2002.808407"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:31:34Z","timestamp":1605760294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}