{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:40:33Z","timestamp":1742982033129,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_36","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:25:17Z","timestamp":1251962717000},"page":"459-474","source":"Crossref","is-referenced-by-count":2,"title":["Adding Trust to P2P Distribution of Paid Content"],"prefix":"10.1007","author":[{"given":"Alex","family":"Sherman","sequence":"first","affiliation":[]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"Cliff","family":"Stein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Apple itunes, \n                    \n                      http:\/\/www.apple.com\/itunes"},{"key":"36_CR2","unstructured":"Amazon, \n                    \n                      http:\/\/www.amazon.com\/"},{"key":"36_CR3","unstructured":"Akamai, \n                    \n                      http:\/\/www.akamai.com\/"},{"key":"36_CR4","unstructured":"Warner bros and p2p, \n                    \n                      http:\/\/arstechnica.com\/news.ars\/post\/20060130-6080.html"},{"key":"36_CR5","unstructured":"Xbox-sky, \n                    \n                      http:\/\/bt.xbox-sky.com\/"},{"key":"36_CR6","unstructured":"Red Skunk Tracker, \n                    \n                      http:\/\/www.inkrecharge.com\/ttrc2\/"},{"key":"36_CR7","unstructured":"Piratebay, \n                    \n                      http:\/\/thepiratebay.org\/"},{"key":"36_CR8","unstructured":"About media defender, \n                    \n                      http:\/\/rss.slashdot.org\/~r\/Slashdot\/slashdot\/~3\/157024087\/article.pl"},{"key":"36_CR9","unstructured":"Limelight, \n                    \n                      http:\/\/www.limelightnetworks.com\/"},{"key":"36_CR10","unstructured":"Vitalstream, \n                    \n                      http:\/\/www.vitalstream.com\/"},{"key":"36_CR11","unstructured":"Aguilar, J.G.: Personal communication (February 2006)"},{"key":"36_CR12","unstructured":"Freedman, M.J., et al.: Coral, \n                    \n                      http:\/\/www.coralcdn.org\/"},{"key":"36_CR13","unstructured":"Pai, V., et al.: Codeen, \n                    \n                      http:\/\/codeen.cs.princeton.edu\/"},{"key":"36_CR14","unstructured":"Bittorrent, \n                    \n                      http:\/\/www.bittorrent.com"},{"key":"36_CR15","unstructured":"Napsterm, \n                    \n                      http:\/\/www.napster.com"},{"key":"36_CR16","unstructured":"Kazaa, \n                    \n                      http:\/\/www.kazaa.com"},{"key":"36_CR17","unstructured":"Yang, X., de Veciana, G.: Service capacity of peer to peer networks. In: INFOCOM (2004)"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Arthur, D., Panigrahy, R.: Analyzing the efficiency of bit-torrent and related peer-to-peer networks. In: SODA (January 2006)","DOI":"10.1145\/1109557.1109664"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Massoulie, L., Vojnovic, M.: Coupon replication systems. In: SIGMETRICS (2005)","DOI":"10.1145\/1064212.1064215"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Qiu, D., Srikant, R.: Modeling and performance analysis of bittorrent-like peet-to-peer networks. In: SIGCOMM (2004)","DOI":"10.1145\/1015467.1015508"},{"key":"36_CR21","unstructured":"Movedigital, \n                    \n                      http:\/\/www.movedigital.com\/"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Biddle, P., England, P., Peinado, M., Willman, B.: The Darknet and the Future of Content Distribution. In: Proceedings of the 2nd ACM Workshop on Digital Rights Management (November 2002)","DOI":"10.1007\/10941270_23"},{"key":"36_CR23","unstructured":"Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust in peer-to-peer communities. IEEE TKDE, Special Issue on Peer-to-Peer Based Data Management 6 (2004)"},{"key":"36_CR24","unstructured":"Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: 5th Workshop on Hot Topics in Networks (2006)"},{"key":"36_CR25","unstructured":"Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of P2P Systems (2003)"},{"key":"36_CR26","unstructured":"Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting BitTorrent for Fun (but not Profit). In: International Workshop on P2P Systems (2006)"},{"key":"36_CR27","unstructured":"Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: A virtual Currency for Peer-To-Peer Systems. In: ACM Workshop on the Economics of Peer-to-Peer Systems (June 2003)"},{"key":"36_CR28","unstructured":"Ngan, T., Nandi, A., Singh, A., Wallach, D., Druschel, P.: Designing Incentives-Compatible Peer-to-Peer Systems. In: Proceedings of the 2nd Workshop on Future Directions in Distributed Computing (2004)"},{"key":"36_CR29","unstructured":"Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Do Incentives Build Robustness in BitTorrent? In: Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI) (April 2007)"},{"key":"36_CR30","unstructured":"Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Building BitTyrant, a (more) strategic BitTorrent client. USENIX;login: 32(4), 8\u201313 (2007)"},{"key":"36_CR31","unstructured":"CCITT: X.509: The Directory Authentication Framework. International Telecommunications Union, Geneva (1989)"},{"key":"36_CR32","unstructured":"Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-independent adaptive replay of application dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS) (February 2006)"},{"key":"36_CR33","unstructured":"Top 22 U.S. ISPs by Subscriber: Q3 2006: Market Research, \n                    \n                      http:\/\/www.isp-planet.com\/research\/rankings\/usa.html"},{"key":"36_CR34","unstructured":"Planetlab, \n                    \n                      http:\/\/www.planetlab.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:29:04Z","timestamp":1558268944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}