{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:22:45Z","timestamp":1768720965596,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540404101","type":"print"},{"value":"9783540449935","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_10","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:21:24Z","timestamp":1277234484000},"page":"155-176","source":"Crossref","is-referenced-by-count":38,"title":["The Darknet and the Future of Content Protection"],"prefix":"10.1007","author":[{"given":"Peter","family":"Biddle","sequence":"first","affiliation":[]},{"given":"Paul","family":"England","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"Peinado","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"Willman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D. Watts","year":"1998","unstructured":"Watts, D., Strogatz, S.: Collective dynamics of small world networks. Nature\u00a0393, 440\u2013442 (1998)","journal-title":"Nature"},{"key":"10_CR2","first-page":"60","volume":"2","author":"S. Milgram","year":"1967","unstructured":"Milgram, S.: The small world problem. Psychology Today\u00a02, 60\u201367 (1967)","journal-title":"Psychology Today"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1038\/43601","volume":"401","author":"R. Albert","year":"1999","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.L.: Diameter of the world-wide web. Nature\u00a0401, 130\u2013131 (1999)","journal-title":"Nature"},{"key":"10_CR4","unstructured":"http:\/\/www.riaa.com"},{"key":"10_CR5","unstructured":"Javanovi\u0107, M., Annexstein, F., Berman, K.: Scalability issues in large peer-to-peer networks \u2013 a case study of gnutella. Technical report, ECECS Department, University of Cincinnati (2001)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: CHORD: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM 2001 Conference (SIGCOMM 2001), pp. 149\u2013160 (2001)","DOI":"10.1145\/383059.383071"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Dabek, F., Brunskill, E., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I., Balakrishnan, H.: Building peer-to-peer systems with Chord, a distributed lookup service. In: Proceedings of the Eigth IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), pp. 81\u201386 (2001)","DOI":"10.1109\/HOTOS.2001.990065"},{"key":"10_CR8","unstructured":"http:\/\/www.napster.com"},{"key":"10_CR9","unstructured":"http:\/\/www.gnutelladev.com\/protocol\/gnutellaprotocol.html"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.: Free riding on Gnutella. Technical report, Xerox-PARC (2000)","DOI":"10.5210\/fm.v5i10.792"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A distributed information storage and retrieval system. In: International Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"10_CR12","unstructured":"Clarke, R.: A defendent class action law suit, http:\/\/www.kentlaw.edu\/perritt\/honorsscholars\/clarke.html"},{"key":"10_CR13","unstructured":"Hand, S., Roscoe, T.: Mnemosyne: peer-to-peer steganographic storage. In: Proceedings of the first International Workshop on Peer-to-Peer Systems (2000)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.L. Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science\u00a0286, 509\u2013512 (1999)","journal-title":"Science"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Aiello, W., Chung, F., Lu, L.: Random evolution in massive graphs. In: Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science, pp. 510\u2013519 (2001)","DOI":"10.1109\/SFCS.2001.959927"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Cooper, C., Frieze, A.: A general model of web graphs. In: Peoceedings of the 9th Annual European Symposium on Algorithms, pp. 500\u2013511 (2001)","DOI":"10.1007\/3-540-44676-1_42"},{"key":"10_CR17","unstructured":"Newman, M.: Small worlds: the structure of social networks. Technical Report 99-12-080, Santa Fe Institute (1999)"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1073\/pnas.012582999","volume":"99","author":"M. Newman","year":"2002","unstructured":"Newman, M., Watts, D., Strogatz, S.: Random graph models of social networks. Proc. Natl. Acad. Sci. USA\u00a099, 2566\u20132572 (2002)","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: Navigation in a small world. Nature 406 (2000)","DOI":"10.1038\/35022643"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: Small-world phenomena and the dynamics of information. In: Advances in Neural Information Processing (NIPS) vol. 14 (2001)","DOI":"10.7551\/mitpress\/1120.003.0060"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper-resistant software: An implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"10_CR22","unstructured":"http:\/\/www.sdmi.org"},{"key":"10_CR23","unstructured":"http:\/\/www.cptwg.org"},{"key":"10_CR24","unstructured":"Hollings, F.: Consumer broadband and digital television promotion act"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-540-44993-5_11","volume-title":"Digital Rights Management","author":"D. Kirovski","year":"2003","unstructured":"Kirovski, D., Petitcolas, F.: Replacement attack on arbitrary watermarking systems. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 177\u2013189. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T19:20:16Z","timestamp":1711567216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}