{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T17:07:36Z","timestamp":1725815256633},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662460771"},{"type":"electronic","value":"9783662460788"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46078-8_33","type":"book-chapter","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T09:54:29Z","timestamp":1421229269000},"page":"401-411","source":"Crossref","is-referenced-by-count":0,"title":["Dominating an s-t-Cut in a Network"],"prefix":"10.1007","author":[{"given":"Ralf","family":"Rothenberger","sequence":"first","affiliation":[]},{"given":"Sascha","family":"Grau","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Rossberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bollapragada, V., Khalid, M., Wainner, S.: IPSec VPN Design. Cisco Press (2005)","key":"33_CR1"},{"doi-asserted-by":"crossref","unstructured":"Vasserman, E., Jansen, R., Tyra, J., Hopper, N., Kim, Y.: Membership-concealing overlay networks. In: 16th ACM CCS, pp. 390\u2013399. ACM (2009)","key":"33_CR2","DOI":"10.1145\/1653662.1653709"},{"unstructured":"Clarke, I., Sandberg, O., Toseland, M., Verendel, V.: Private communication through a network of trusted connections: The dark freenet. Network (2010)","key":"33_CR3"},{"doi-asserted-by":"crossref","unstructured":"Rossberg, M., Girlich, F., Schaefer, G.: Analyzing and Improving the Resistance of Overlays against Bandwidth Exhaustion Attacks. In: International Workshop on Reliable Networks Design and Modeling (RNDM) (2012)","key":"33_CR4","DOI":"10.1109\/ICUMT.2012.6459768"},{"doi-asserted-by":"crossref","unstructured":"Girlich, F., Rossberg, M., Schaefer, G.: On the Resistance of Overlay Networks against Bandwidth Exhaustion Attacks. Accepted for Telecommunication Systems Journal (Special Issue) (2014)","key":"33_CR5","DOI":"10.1007\/s11235-015-9992-x"},{"key":"33_CR6","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"R.K. Ahuja","year":"1993","unstructured":"Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc., Upper Saddle River (1993)"},{"unstructured":"Carr, R.D., Doddi, S., Konjevod, G., Marathe, M.: On the red-blue set cover problem. In: ACM-SIAM Symposium on Discrete Algorithms, pp. 345\u2013353 (2000)","key":"33_CR7"},{"issue":"2","key":"33_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/1150334.1150336","volume":"2","author":"N. Alon","year":"2006","unstructured":"Alon, N., Moshkovitz, D., Safra, S.: Algorithmic construction of sets for k-restrictions. ACM Trans. Algorithms\u00a02(2), 153\u2013177 (2006)","journal-title":"ACM Trans. Algorithms"},{"issue":"1","key":"33_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jda.2006.03.008","volume":"5","author":"D. Peleg","year":"2007","unstructured":"Peleg, D.: Approximation algorithms for the label-covermax and red-blue set cover problems. Journal of Discrete Algorithms\u00a05(1), 55\u201364 (2007)","journal-title":"Journal of Discrete Algorithms"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2015: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46078-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:25Z","timestamp":1559088025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46078-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662460771","9783662460788"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46078-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}