{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T07:40:54Z","timestamp":1683358854279},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,1,27]],"date-time":"2006-01-27T00:00:00Z","timestamp":1138320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2007,8,13]]},"DOI":"10.1007\/s00778-005-0175-3","type":"journal-article","created":{"date-parts":[[2006,1,20]],"date-time":"2006-01-20T12:57:39Z","timestamp":1137761859000},"page":"463-482","source":"Crossref","is-referenced-by-count":5,"title":["Free riding-aware forwarding in Content-Addressable Networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Klemens","family":"B\u00f6hm","sequence":"first","affiliation":[]},{"given":"Erik","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,1,27]]},"reference":[{"key":"175_CR1","doi-asserted-by":"crossref","unstructured":"Aberer, K., P-Grid: A self-organizing access structure for P2P information systems. In: CooplS '01: Proceedings of the 9th International Conference on Cooperative Information Systems, pp. 179\u2013194. Springer-Verlag, London, UK (2001)","DOI":"10.1007\/3-540-44751-2_15"},{"key":"175_CR2","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the Conference on Information and Knowledge Management (2001)","DOI":"10.1145\/502585.502638"},{"key":"175_CR3","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.: Free riding on gnutella. First Monday 5(10) (2000)","DOI":"10.5210\/fm.v5i10.792"},{"key":"175_CR4","unstructured":"Back, A.: Hashcash \u2013 A denial of service counter-measure. http:\/\/www.cypherspace.org\/~adam\/hashcash\/ (2002)"},{"key":"175_CR5","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical Report IC\/2003\/31, EPFL (2003)","DOI":"10.1201\/9780203504086.ch20"},{"key":"175_CR6","doi-asserted-by":"crossref","unstructured":"Buchmann, E., B\u00f6hm, K.: FairNet \u2013 how to counter free riding in peer-to-peer data structures. In: Proceedings of the International Conference on Cooperative Information Systems 2004, Agia Napa, Cyprus (2004)","DOI":"10.1007\/978-3-540-30468-5_22"},{"key":"175_CR7","doi-asserted-by":"crossref","unstructured":"Buchmann, E., B\u00f6hm, K.: How to run experiments with large peer-to-peer data structures. In: Proceedings of the 18th Int. Parallel and Distributed Processing Symposium, Santa Fe, USA (2004)","DOI":"10.1109\/IPDPS.2004.1302938"},{"key":"175_CR8","doi-asserted-by":"crossref","unstructured":"Buragohain, C., Agrawal, D., Suri, S.: A game-theoretic framework for incentives in P2P systems. In: Proceedings of P2P2003, Linkoping, Sweden (2003)","DOI":"10.1109\/PTP.2003.1231503"},{"key":"175_CR9","unstructured":"Chang, B.E., et al.: Trustless grid computing in ConCert. proceedings of Grid02, Berlin (2002)"},{"key":"175_CR10","unstructured":"Datta, A., Hauswirth, M., Aberer, K.: Beyond \u201cWeb of Trust\u201d: enabling P2P E-commerce. Proceedings of the IEEE Conference on E-Commerce, USA (2003)"},{"key":"175_CR11","doi-asserted-by":"crossref","unstructured":"Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. ACM Electronic Commerce, 2004. (2004)","DOI":"10.1145\/988772.988788"},{"key":"175_CR12","doi-asserted-by":"crossref","unstructured":"Friedman, E., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10(2) (1998)","DOI":"10.1162\/105864001300122476"},{"key":"175_CR13","unstructured":"Garcia-Molina, H., Schlosser, M.T., Kamvar, S.D.: The eigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the Twelfth International World Wide Web Conference (2003)"},{"key":"175_CR14","doi-asserted-by":"crossref","unstructured":"Golle, P., et al.: Incentives for sharing in Peer-to-Peer Networks. Lecture Notes in Computer Science 2232 (2001)","DOI":"10.1145\/501158.501193"},{"key":"175_CR15","doi-asserted-by":"crossref","unstructured":"Gribble, S.D., et al.: The Ninja architecture for robust Internet-scale systems and services. Computer Networks, Amsterdam, Netherlands 35(4) (1999)","DOI":"10.1016\/S1389-1286(00)00179-1"},{"key":"175_CR16","doi-asserted-by":"crossref","unstructured":"Gummadi, K., et al.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of the SIGCOMM 2003. ACM Press (2003)","DOI":"10.1145\/863955.863998"},{"key":"175_CR17","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Proceedings of the CMS'99, Leuven, Belgium (1999)","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"175_CR18","doi-asserted-by":"crossref","unstructured":"Kroell, B., Widmayer, P.: Distributing a search tree among a growing number of processors. Technical Report 1994PA-drt, Swiss Federal Institute of Technology, Z\u00fcrich (1994)","DOI":"10.1145\/191839.191891"},{"key":"175_CR19","unstructured":"Litwin, W., Neimat, M.A., Schneider, D.A.: LH* \u2013 linear hashing for distributed files. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Washington, D.C. ACM Press (1993)"},{"key":"175_CR20","unstructured":"Marsh, S.: Formalising trust as a computational concept. Ph.D. Thesis., Department of Mathematics and Computer Science, University of Stirling (1994)"},{"key":"175_CR21","doi-asserted-by":"crossref","unstructured":"Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Conference on Mobile Computing and Networking. ACM Press (2000)","DOI":"10.1145\/345910.345955"},{"key":"175_CR22","doi-asserted-by":"crossref","unstructured":"Padovan, B., et al.: A prototype for an agent based secure electronic marketplace including reputation tracking mechanisms. In: Proceedings of the Hawaii International Conference on System Sciences (2001)","DOI":"10.1109\/HICSS.2001.927039"},{"key":"175_CR23","doi-asserted-by":"crossref","unstructured":"Ramaswamy, L., Liu, L.: Free riding: A new challenge to peer-to-peer file sharing systems. In: Proceedings of the 36th HICSS Conference, Hawaii (2003)","DOI":"10.1109\/HICSS.2003.1174583"},{"key":"175_CR24","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., et al.: A scalable content-sddressable network. In: Proceedings of the ACM SIGCOMM Conference. ACM Press, New York (2001)","DOI":"10.1145\/964723.383072"},{"key":"175_CR25","doi-asserted-by":"crossref","unstructured":"Reidemeister, T., et al.: Malicious behaviour in content-addressable Peer-to-Peer Networks. Proceedings of the Third Conference on Communication Networks and Services Research, Canada (2005)","DOI":"10.1109\/CNSR.2005.39"},{"key":"175_CR26","doi-asserted-by":"crossref","unstructured":"Resnick, P., et al.: Reputation systems. Commun. ACM 43(12) (2000)","DOI":"10.1145\/355112.355122"},{"key":"175_CR27","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"175_CR28","doi-asserted-by":"crossref","unstructured":"Stoica, I., et al.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM Conference (2001)","DOI":"10.1145\/383059.383071"},{"key":"175_CR29","doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7) (2004)","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"175_CR30","doi-asserted-by":"crossref","unstructured":"Yang, B., Garcia-Molina, H.: PPay: Micropayments for peer-to-peer systems. In: V. Atluri, P. Liu (eds.) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS-03). ACM Press, New York (2003)","DOI":"10.1145\/948109.948150"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-005-0175-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-005-0175-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-005-0175-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T07:13:42Z","timestamp":1683357222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-005-0175-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1,27]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,8,13]]}},"alternative-id":["175"],"URL":"https:\/\/doi.org\/10.1007\/s00778-005-0175-3","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1,27]]}}}