{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:48:18Z","timestamp":1725727698507},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642383229"},{"type":"electronic","value":"9783642383236"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38323-6_11","type":"book-chapter","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T01:02:28Z","timestamp":1369789348000},"page":"151-165","source":"Crossref","is-referenced-by-count":1,"title":["Securing Identity Assignment Using Implicit Certificates in P2P Overlays"],"prefix":"10.1007","author":[{"given":"Juan","family":"Caubet","sequence":"first","affiliation":[]},{"given":"Oscar","family":"Esparza","sequence":"additional","affiliation":[]},{"given":"Juanjo","family":"Alins","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Mata-D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Soriano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Cisco visual networking index: Forecast and methodology (2011-2016), \n                    \n                      http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-36532-X_4","volume-title":"Software Security \u2013 Theories and Systems","author":"D.S. Wallach","year":"2003","unstructured":"Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 42\u201357. Springer, Heidelberg (2003)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/3-540-45472-1_8","volume-title":"Financial Cryptography","author":"L.A. Pintsov","year":"2001","unstructured":"Pintsov, L.A., Vanstone, S.A.: Postal revenue collection in the digital age. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 105\u2013120. Springer, Heidelberg (2001)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-46088-8_15","volume-title":"Financial Cryptography","author":"D.R.L. Brown","year":"2002","unstructured":"Brown, D.R.L., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Syverson, P. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 156\u2013165. Springer, Heidelberg (2002)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Fantacci, R., Maccari, L., Rosi, M., Chisci, L., Aiello, L.M., Milanesio, M.: Avoiding eclipse attacks on kad\/kademlia: an identity based approach. In: IEEE International Conference on Communications (ICC), Dresden, Germany, pp. 1\u20135. IEEE Press (June 2009)","DOI":"10.1109\/ICC.2009.5198772"},{"key":"11_CR6","first-page":"161","volume-title":"ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM)","author":"S. Ratnasamy","year":"2001","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), San Diego, CA, USA, pp. 161\u2013172. ACM, New York (2001)"},{"key":"11_CR7","first-page":"149","volume-title":"ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM)","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Frans Kaaskoek, M., Balakrishman, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), San Diego, CA, USA, pp. 149\u2013160. ACM, New York (2001)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 53\u201365. Springer, Heidelberg (2002)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.comnet.2005.07.011","volume":"50","author":"S. Marti","year":"2006","unstructured":"Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing p2p reputation systems. Comput. Netw.\u00a050(4), 472\u2013484 (2006)","journal-title":"Comput. Netw."},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/844128.844156","volume":"36","author":"M. Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. ACM Operating Systems Review (OSR)\u00a036, 299\u2013314 (2002)","journal-title":"ACM Operating Systems Review (OSR)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/CSAC.2004.50","volume-title":"20th Annual Computer Security Applications Conference (ACSAC)","author":"M. Srivatsa","year":"2004","unstructured":"Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, pp. 252\u2013261. IEEE Computer Society, Washington, DC (2004)"},{"issue":"12","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TPDS.2008.249","volume":"20","author":"K.R.B. Butler","year":"2009","unstructured":"Butler, K.R.B., Ryu, S., Traynor, P., McDaniel, P.D.: Leveraging identity-based cryptography for node id assignment in structured p2p systems. IEEE Transactions on Parallel and Distributed Systems\u00a020(12), 1803\u20131815 (2009)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"11_CR15","first-page":"1","volume-title":"13th International Conference on Parallel and Distributed Systems","author":"I. Baumgart","year":"2007","unstructured":"Baumgart, I., Mies, S.: S\/kademlia: A practicable approach towards secure key-based routing. In: 13th International Conference on Parallel and Distributed Systems, vol.\u00a02, pp. 1\u20138. IEEE Computer Society, Washington, DC (2007)"},{"key":"11_CR16","first-page":"30","volume-title":"8th International Conference on Peer-to-Peer Computing (P2P)","author":"L.M. Aiello","year":"2008","unstructured":"Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tempering kademlia with a robust identity based system. In: 8th International Conference on Peer-to-Peer Computing (P2P), pp. 30\u201339. IEEE Computer Society, Washington, DC (2008)"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s12083-010-0099-6","volume":"4","author":"L.M. Aiello","year":"2011","unstructured":"Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: An identity-based approach to secure p2p applications with likir. Peer-to-Peer Networking and Applications\u00a04, 420\u2013438 (2011)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Rowaihy, H., Enck, W., McDaniel, P.D., La Porta, T.F.: Limiting sybil attacks in structured p2p networks. In: 26th IEEE International conference on Computer communications (INFOCOM), Anchorage, Alaska, USA, pp. 2596\u20132600. IEEE Communications Society (May 2007)","DOI":"10.1109\/INFCOM.2007.328"},{"issue":"11","key":"11_CR19","doi-asserted-by":"publisher","first-page":"2569","DOI":"10.1016\/j.comnet.2012.03.026","volume":"56","author":"W.L. Costa Cordeiro Da","year":"2012","unstructured":"Da Costa Cordeiro, W.L., Santos, F.R., Mauch, G.H., Barcelos, M.P., Gaspary, L.P.: Identity management based on adaptive puzzles to protect p2p systems from sybil attacks. Comput. Netw.\u00a056(11), 2569\u20132589 (2012)","journal-title":"Comput. Netw."},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-642-04843-2_53","volume-title":"Advances in Computation and Intelligence","author":"C. Lu","year":"2009","unstructured":"Lu, C.: Detection and defense of identity attacks in p2p network. In: Cai, Z., Li, Z., Kang, Z., Liu, Y. (eds.) ISICA 2009. LNCS, vol.\u00a05821, pp. 500\u2013507. Springer, Heidelberg (2009)"},{"issue":"3","key":"11_CR21","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H. Yu","year":"2008","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D.: Sybilguard: Defending against sybil attacks via social networks. IEEE\/ACM Transactions on Networking\u00a016(3), 576\u2013589 (2008)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"H. Yu","year":"2010","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. IEEE\/ACM Transactions on Networking\u00a018(3), 885\u2013898 (2010)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Tran, N., Li, J., Subramanian, L., Chow, S.S.M.: Optimal sybil-resilient node admission control. In: 30th IEEE International Conference on Computer Communications (INFOCOM), Shanghai, P.R. China, pp. 3218\u20133226. IEEE Communications Society (April 2011)","DOI":"10.1109\/INFCOM.2011.5935171"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Lesueur, F., M\u00e9, L., Tong, V.V.T.: A sybilproof distributed identity management for p2p networks. In: IEEE Symposium on Computers and Communications (ISCC), Marrakech, Morocco, pp. 246\u2013253. IEEE Computer Society (July 2008)","DOI":"10.1109\/ISCC.2008.4625694"},{"key":"11_CR25","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography, 1st edn. CRC Press, Inc., Boca Raton (1996)","edition":"1"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management VII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38323-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T13:57:39Z","timestamp":1558360659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38323-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642383229","9783642383236"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38323-6_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}