{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:55:05Z","timestamp":1725540905511},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642104848"},{"type":"electronic","value":"9783642104855"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10485-5_14","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:23:22Z","timestamp":1258079002000},"page":"192-205","source":"Crossref","is-referenced-by-count":0,"title":["A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT"],"prefix":"10.1007","author":[{"given":"Zhixin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Kai","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"B.Y. Zhao","year":"2004","unstructured":"Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowica, J.D.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. J. IEEE Journal on Selected Areas in Communications\u00a022, 41\u201353 (2004)","journal-title":"J. IEEE Journal on Selected Areas in Communications"},{"key":"14_CR3","first-page":"31","volume-title":"International Symposium on Software Security","author":"D.S. Wallach","year":"2003","unstructured":"Wallach, D.S.: A Survey of Peer-to-Peer Security Issues. In: International Symposium on Software Security, pp. 31\u2013338. Springer, Heidelberg (2003)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","volume":"7","author":"E.K. Lua","year":"2005","unstructured":"Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. J. IEEE Communications Survey and Tutorial\u00a07, 72\u201393 (2005)","journal-title":"J. IEEE Communications Survey and Tutorial"},{"key":"14_CR5","unstructured":"Rescorla, E.: Introduction to Distributed Hash Tables. Technical report, IAB Plenary, IETF-65 (2006)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-45748-8_25","volume-title":"Peer-to-Peer Systems","author":"E. Sit","year":"2002","unstructured":"Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 261\u2013269. Springer, Heidelberg (2002)"},{"key":"14_CR7","first-page":"113","volume-title":"7th IEEE International Conference on Peer-to-Peer Computing","author":"F. Klemm","year":"2007","unstructured":"Klemm, F., Girdzijauskas, S., Le Boudec, J.-Y., Aberer, K.: On Routing in Distributed Hash Tables. In: 7th IEEE International Conference on Peer-to-Peer Computing, pp. 113\u2013122. Springer, Berlin (2007)"},{"key":"14_CR8","first-page":"149","volume-title":"Annual Conference of the Special Interest Group on Data Communication","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, F., Baladrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Annual Conference of the Special Interest Group on Data Communication, pp. 149\u2013160. ACM Press, New York (2001)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-39989-6_23","volume-title":"Distributed Computing","author":"K. Hildrum","year":"2003","unstructured":"Hildrum, K., Kubiatowicz, J.: Asymptotically Efficient Approaches to Fault-tolerance in Peer-to-Peer Networks. In: Fich, F.E. (ed.) DISC 2003. LNCS, vol.\u00a02848, pp. 321\u2013336. Springer, Heidelberg (2003)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Castro M., Druschel P., Ganesh A., Powstron A., Wallach D. S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: 5th Symposium on Operating Systems Design and Implementation (2002)","DOI":"10.1145\/1060289.1060317"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Charlie Hu, Y., Rowstron, A.: Topology-aware Routing in Structured Peer-to-Peer Overlay Networks. Technical report, Microsoft Research (2002)","DOI":"10.1145\/844128.844156"},{"key":"14_CR12","unstructured":"Wang, P., Hopper, N., Osipkiv, I., Kim, Y.: Myrmic: Secure and Robust DHT Routing. Technical report, DTC Research Report (2006)"},{"key":"14_CR13","first-page":"123","volume-title":"12th International World Wide Web Conference","author":"S.D. Kamvar","year":"2003","unstructured":"Kamvar, S.D., Schlosser, M.T.: EigenRep: Reputation Management in P2P Networks. In: 12th International World Wide Web Conference, pp. 123\u2013134. ACM Press, New York (2003)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-30183-7_10","volume-title":"Peer-to-Peer Systems III","author":"S. Marti","year":"2005","unstructured":"Marti, S., Ganesan, P., Garcia-Molina, H.: DHT Routing Using Social Links. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol.\u00a03279, pp. 100\u2013111. Springer, Heidelberg (2005)"},{"key":"14_CR15","first-page":"133","volume-title":"22nd Annual Symposium on Principles of Distributed Computing","author":"M.G. Singh","year":"2003","unstructured":"Singh, M.G.: Routing Networks for Distributed Hash Tables. In: 22nd Annual Symposium on Principles of Distributed Computing, pp. 133\u2013142. ACM Press, New York (2003)"},{"key":"14_CR16","first-page":"161","volume-title":"Annual Conference of the Special Interest Group on Data Communications","author":"S. Rarnasamy","year":"2001","unstructured":"Rarnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Annual Conference of the Special Interest Group on Data Communications, pp. 161\u2013172. ACM Press, New York (2001)"},{"key":"14_CR17","first-page":"18","volume":"43","author":"Z.H. Yu","year":"2007","unstructured":"Yu, Z.H.: Analysis of Malicious Behaviors in Peer-to-Peer Trust Model. J. Computer Engineering and Applications\u00a043, 18\u201321 (2007)","journal-title":"J. Computer Engineering and Applications"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Scalable Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10485-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T16:31:31Z","timestamp":1558629091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10485-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642104848","9783642104855"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10485-5_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}