{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:59Z","timestamp":1755838139763},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026263"},{"type":"electronic","value":"9783642026270"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02627-0_6","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T05:05:54Z","timestamp":1245301554000},"page":"70-82","source":"Crossref","is-referenced-by-count":13,"title":["Evaluation of Sybil Attacks Protection Schemes in KAD"],"prefix":"10.1007","author":[{"given":"Thibault","family":"Cholez","sequence":"first","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"299","volume-title":"OSDI 2002: Proceedings of the 5th symposium on Operating systems design and implementation","author":"M. Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI 2002: Proceedings of the 5th symposium on Operating systems design and implementation, pp. 299\u2013314. ACM, New York (2002)"},{"key":"6_CR2","first-page":"756","volume-title":"ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security","author":"J. Dinger","year":"2006","unstructured":"Dinger, J., Hartenstein, H.: Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 756\u2013763. IEEE Computer Society, Los Alamitos (2006)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Lesueur, F., M\u00e9, L., Tong, V.V.T.: A sybil-resistant admission control coupling SybilGuard with distributed certification. In: Proceedings of the 4th International Workshop on Collaborative Peer-to-Peer Systems (COPS), Rome (June 2008)","DOI":"10.1109\/WETICE.2008.7"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 53\u201365. Springer, Heidelberg (2002)"},{"key":"6_CR6","volume-title":"SecureComm 2008: the 4th International Conference on Security and Privacy in Communication Networks","author":"E. Chan-Tin","year":"2008","unstructured":"Chan-Tin, E., Malchow, T., Kune, D.F., Hopper, N., Kim, Y., Wang, P., Tyra, J.: Attacking the kad network. In: SecureComm 2008: the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey. ACM, New York (2008)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1109\/INFCOM.2007.328","volume-title":"26th IEEE International Conference on Computer Communications, INFOCOM 2007","author":"H. Rowaihy","year":"2007","unstructured":"Rowaihy, H., Enck, W., McDaniel, P., La Porta, T.: Limiting sybil attacks in structured p2p networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2596\u20132600. IEEE, Los Alamitos (2007)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1133572.1133613","volume-title":"EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop","author":"A. Singh","year":"2004","unstructured":"Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop, p. 21. ACM, New York (2004)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Steiner, M., Najjary, T.E., Biersack, E.W.: Exploiting KAD: possible uses and misuses. Computer communications review\u00a037(5) (October 2007)","DOI":"10.1145\/1290168.1290176"},{"issue":"4","key":"6_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"H. Yu","year":"2006","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Com. Rev.\u00a036(4), 267\u2013278 (2006)","journal-title":"SIGCOMM Comput. Com. Rev."}],"container-title":["Lecture Notes in Computer Science","Scalability of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02627-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:57:36Z","timestamp":1558382256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02627-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026263","9783642026270"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02627-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}