{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:19:25Z","timestamp":1743031165710,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315121"},{"type":"electronic","value":"9783642315138"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31513-8_80","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T09:39:17Z","timestamp":1340962757000},"page":"789-795","source":"Crossref","is-referenced-by-count":0,"title":["SEPastry: Security Enhanced Pastry"],"prefix":"10.1007","author":[{"given":"Madhumita","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Sathya","family":"Peri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"80_CR2","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Kermarrec, A.-M., Druschel, P., Castro, M.: Scribe: The design of a large-scale event notification infrastructure. In: Intl. Workshop on Networked Group Communication (NGC 2001) (June 2001)","DOI":"10.1007\/3-540-45546-9_3"},{"key":"80_CR3","doi-asserted-by":"crossref","unstructured":"Cerri, D., Ghioni, A., Paraboschi, S., Tiraboschi, S.: ID mapping attacks in P2P networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, December 3 (2005)","DOI":"10.1109\/GLOCOM.2005.1577956"},{"key":"80_CR4","unstructured":"Rowaihy, H., William, E., Patrick, M., Porta, T.L.: Limiting sybil attacks in structured peer-to-peer networks. Technical Report NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (2005)"},{"key":"80_CR5","first-page":"756","volume-title":"Proc. 1st International Conference on Availability, Reliability and Security","author":"J. Dinger","year":"2006","unstructured":"Dinger, J., Hartentstein: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges,and a Proposal for Self-Registration. In: Proc. 1st International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 756\u2013763. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"80_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"80_CR7","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1109\/TPDS.2008.241","volume":"2010","author":"K. Puttaswamy","year":"2009","unstructured":"Puttaswamy, K., Zheng, H., Zhao, B.: Securing structured overlays against identity attacks. IEEE Transactions on Paralleland Distributed Systems\u00a02010, 1487\u20131498 (2009)","journal-title":"IEEE Transactions on Paralleland Distributed Systems"},{"key":"80_CR8","unstructured":"Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tampering Kadmelia with a Robust Identity Based System. Computer science Department - Universit\u2018a degli Studi di Torino, Italy"},{"key":"80_CR9","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proc. of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston, MA (December 2002)","DOI":"10.1145\/1060289.1060317"},{"key":"80_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-77366-5_18","volume-title":"Financial Cryptography and Data Security","author":"N.B. Margolin","year":"2007","unstructured":"Margolin, N.B., Levine, B.N.: Informant: Detecting Sybils Using Incentives. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 192\u2013207. Springer, Heidelberg (2007)"},{"key":"80_CR11","doi-asserted-by":"crossref","unstructured":"Druschel, P., Rowstron, A.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proc. HotOS VIII, Schloss Elmau, Germany (May 2001)","DOI":"10.1145\/502034.502053"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31513-8_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T06:39:52Z","timestamp":1674110392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31513-8_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315121","9783642315138"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31513-8_80","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}