{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:57Z","timestamp":1725551217886},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_6","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"76-89","source":"Crossref","is-referenced-by-count":5,"title":["Trust in Peer-to-Peer Content Distribution Protocols"],"prefix":"10.1007","author":[{"given":"Nicolai","family":"Kuntze","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Fuchs","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Baumgart, I., Mies, S.: S\/Kademlia: A practicable approach towards secure key-based routing. In: Proceedings of the International Workshop on Peer-to-Peer Networked Virtual Environments (2007)","DOI":"10.1109\/ICPADS.2007.4447808"},{"issue":"6","key":"6_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on information Theory"},{"key":"6_CR3","unstructured":"Einhorn, M., Madison, N.: How Advertising and Peer-to-Peer are Transforming Digital Media and Copyright. Journal of the Copyright Society (2007)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Erman, D., Ilie, D., Popescu, A.: Bittorrent session characteristics and models. Traffic Engineering, Performance Evaluation Studies and Tools for Heterogeneous Networks\u00a061(84), 61","DOI":"10.1201\/9781003339878-4"},{"key":"6_CR5","first-page":"1859","volume":"3","author":"W. Fang","year":"1999","unstructured":"Fang, W., Peterson, L.: Inter-AS traffic patterns and their implications. Globecom-New York\u00a03, 1859\u20131868 (1999)","journal-title":"Globecom-New York"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-540-74835-9_29","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S. Gurgens","year":"2007","unstructured":"Gurgens, S., Rudolph, C., Scheuermann, D., Atts, M., Plaga, R.: Security Evaluation of Scenarios Based on the TCG\u2019s TPM Specification. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 438\u2013453. Springer, Heidelberg (2007)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505202.505224","volume-title":"Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement","author":"B. Krishnamurthy","year":"2001","unstructured":"Krishnamurthy, B., Wills, C., Zhang, Y.: On the use and performance of content distribution networks. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 169\u2013182. ACM, New York (2001)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Leicher, A., Schmidt, A.: Implementation of a trusted ticket system. In: Proceedings of the IFIP Security 2009 (2009)","DOI":"10.1007\/978-3-642-01244-0_14"},{"key":"6_CR9","unstructured":"Kuntze, N., M\u00e4hler, D., Schmidt, A.U.: Employing trusted computing for the forward pricing of pseudonyms in reputation systems. In: Axmedis 2006, Proceedings of the 2nd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions (2006)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Laoutaris, N., Rodriguez, P., Massoulie, L.: ECHOS: edge capacity hosting overlays of nano data centers (2008)","DOI":"10.1145\/1341431.1341442"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Liang, J., Naoumov, N., Ross, K.: The index poisoning attack in p2p file sharing systems. In: INFOCOM 2006. Proceedings of 25th IEEE International Conference on Computer Communications, pp. 1\u201312 (2006)","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 2. Springer, Heidelberg (2002)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Mitchell, C., et al.: Trusted Computing, p. 1 (2005)","DOI":"10.1049\/PBPC006E"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/11558989_19","volume-title":"Peer-to-Peer Systems IV","author":"J. Pouwelse","year":"2005","unstructured":"Pouwelse, J., Garbacki, P., Epema, D., Sips, H.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol.\u00a03640, pp. 205\u2013216. Springer, Heidelberg (2005)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1456455.1456457","volume-title":"Proceedings of the 3rd ACM workshop on Scalable trusted computing","author":"F. Stumpf","year":"2008","unstructured":"Stumpf, F., Fuchs, A., Katzenbeisser, S., Eckert, C.: Improving the scalability of platform attestation. In: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp. 1\u201310. ACM, New York (2008)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/3-540-36532-X_4","volume-title":"A survey of peer-to-peer security issues","author":"D. Wallach","year":"2003","unstructured":"Wallach, D.: A survey of peer-to-peer security issues. LNCS, pp. 42\u201357. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T18:47:11Z","timestamp":1685558831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}