{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:32:05Z","timestamp":1696473125575},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T00:00:00Z","timestamp":1294272000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s12083-010-0099-6","type":"journal-article","created":{"date-parts":[[2011,1,5]],"date-time":"2011-01-05T09:46:57Z","timestamp":1294220817000},"page":"420-438","source":"Crossref","is-referenced-by-count":8,"title":["An identity-based approach to secure P2P applications with Likir"],"prefix":"10.1007","volume":"4","author":[{"given":"Luca Maria","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Marco","family":"Milanesio","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Ruffo","sequence":"additional","affiliation":[]},{"given":"Rossano","family":"Schifanella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,6]]},"reference":[{"key":"99_CR1","unstructured":"Abbas S, Pouwelse J, Epema D, Sips H (2009) A gossip-based distributed social networking system. In: WETICE\u201909: 18th IEEE international workshops on enabling technologies. Groningen, Netherlands. IEEE Computer Society, 29 June\u20131 July 2009, pp 93\u201398"},{"key":"99_CR2","doi-asserted-by":"crossref","unstructured":"Aiello LM, Milanesio M, Ruffo G, Schifanella R (2008) Tempering Kademlia with a robust identity based system. In: P2P \u201908: Proceedings of the 2008 eighth international conference on peer-to-peer computing. IEEE Computer Society, Washington, DC, USA, pp 30\u201339. doi: 10.1109\/P2P.2008.40","DOI":"10.1109\/P2P.2008.40"},{"key":"99_CR3","unstructured":"Aiello LM, Ruffo G (2010) Secure and flexible framework for decentralized social network services. In: SESOC \u201910: Security and Social Networking Workshop. IEEE Computer Society, pp 594\u2013599"},{"key":"99_CR4","volume-title":"P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing","author":"J Dharanipragada Janakiram","year":"2009","unstructured":"Dharanipragada Janakiram J (2009) SyMon: Defending large structured P2P systems against sybil attack. In: P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA"},{"key":"99_CR5","doi-asserted-by":"crossref","unstructured":"Baumgart I, Mies S (2007) S\/Kademlia: a practicable approach towards secure key-based routing. In: Proc. of P2P-NVE 2007 in conjunction with ICPADS 2007, Hsinchu, Taiwan, vol 2. doi: 10.1109\/ICPADS.2007.4447808","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"99_CR6","doi-asserted-by":"crossref","unstructured":"Bender A, Sherwood R, Monner D, Goergen N, Spring N, Bhattacharjee B (2009) Fighting spam with the NeighborhoodWatch DHT. In: INFOCOM","DOI":"10.1109\/INFCOM.2009.5062095"},{"key":"99_CR7","doi-asserted-by":"crossref","unstructured":"Bird R, Gopal I, Herzberg A, Janson P, Kutten S, Molva R, Yung M (1992) Systematic design of a family of attack-resistant authentication protocols. Tech. rep., IBM Raleigh, Watson and Zurich Laboratories","DOI":"10.1109\/49.223869"},{"issue":"3","key":"99_CR8","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the Weil Pairing. SIAM J Comput 32(3):586\u2013615. doi: 10.1137\/S0097539701398521","journal-title":"SIAM J Comput"},{"key":"99_CR9","unstructured":"Brunner R (2006) A performance evaluation of the kad protocol. Master\u2019s thesis, Institut Eurecom"},{"key":"99_CR10","volume-title":"WONS\u201909: 6th international conference on wireless on-demand network systems and services","author":"S Buchegger","year":"2009","unstructured":"Buchegger S, Datta A (2009) A Case for P2P infrastructure for social networks\u2014opportunities and challenges. In: WONS\u201909: 6th international conference on wireless on-demand network systems and services. Snowbird, Utah, USA"},{"key":"99_CR11","doi-asserted-by":"crossref","unstructured":"Buchegger S, Schi\u00f6berg D, Vu LH, Datta A (2009) PeerSoN: P2P social networking\u2014early experiences and insights. In: SNS\u201909: 2nd ACM workshop on social network systems social network systems. N\u00fcrnberg, Germany","DOI":"10.1145\/1578002.1578010"},{"key":"99_CR12","doi-asserted-by":"crossref","unstructured":"Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. In: OSDI \u201902: proceedings of the 5th symposium on operating systems design and implementation. ACM, New York, NY, USA, pp 299\u2013314. doi: 10.1145\/1060289.1060317","DOI":"10.1145\/1060289.1060317"},{"key":"99_CR13","volume-title":"P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing","author":"BN Cheng","year":"2009","unstructured":"Cheng BN, Yuksel M, Kalyanaraman S (2009) Virtual direction routing for overlay networks. In: P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA"},{"key":"99_CR14","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Proc. of the 8th IMA int. conf. on cryptography and coding","author":"C Cocks","year":"2001","unstructured":"Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Proc. of the 8th IMA int. conf. on cryptography and coding. Springer, London, UK, pp 360\u2013363"},{"key":"99_CR15","unstructured":"Condie T, Kacholia V, Sankararaman S, Hellerstein JM, Maniatis P (2006) Induced churn as shelter from routing-table poisoning. In: Proc. of NDSS 2006, San Diego, California, USA"},{"key":"99_CR16","doi-asserted-by":"crossref","unstructured":"Cutillo LA, Molva R, Strufe T (2009) Leveraging social links for trust and privacy in networks. In: INet Sec 2009. Open Research Problems in Network Security. Zurich, Switzerland","DOI":"10.1007\/978-3-642-05437-2_3"},{"key":"99_CR17","doi-asserted-by":"crossref","unstructured":"Douceur J (2002) The sybil attack. In: Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"99_CR18","volume-title":"P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing","author":"Z Ennan","year":"2009","unstructured":"Ennan Z, Ruichuan C, Zhuhua C, Long Z, Huiping S, Eng KL, Sihan Q, Liyong T, Zhong C (2009) Virtual direction routing for overlay networks. In: P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA"},{"key":"99_CR19","unstructured":"Gangishetti R, Gorantla MC, Saxena A (2005) A survey on ID-based cryptographic primitives. Cryptology eprint archive, report2005\/094"},{"key":"99_CR20","volume-title":"P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing","author":"R Guerraoui","year":"2009","unstructured":"Guerraoui R, Huguenin K, Kermarrec AM, Monod M (2009) On tracking freeriders in gossip protocols. In: P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA"},{"key":"99_CR21","unstructured":"Iamnitchi A, Ripeanu M, Foster I (2004) Small world file sharing communities. In: InfoCom \u201904: proceedings of the 23rd conference of the IEEE communications society. http:\/\/citeseer.ist.psu.edu\/iamnitchi04smallworld.html"},{"issue":"2","key":"99_CR22","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A Josang","year":"2007","unstructured":"Josang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"99_CR23","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"WWW \u201903: proceedings of the 12th international conference on World Wide Web","author":"SD Kamvar","year":"2003","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: WWW \u201903: proceedings of the 12th international conference on World Wide Web. ACM, New York, NY, USA, pp 640\u2013651"},{"key":"99_CR24","doi-asserted-by":"crossref","unstructured":"Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, Wells C, Zhao B (2000) Oceanstore: an architecture for global-scale persistent storage, pp 190\u2013201","DOI":"10.1145\/356989.357007"},{"key":"99_CR25","volume-title":"P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing","author":"F Lesueur","year":"2009","unstructured":"Lesueur F, Me L, Viet Triem Tong V (2009) An efficient distributed pki for structured P2P networks. In: P2P \u201909: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA"},{"key":"99_CR26","doi-asserted-by":"crossref","unstructured":"Liang J, Kumar R, Xi Y, Ross K (2005) Pollution in P2P file sharing systems. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE, pp 1174\u20131185","DOI":"10.1109\/INFCOM.2005.1498344"},{"key":"99_CR27","doi-asserted-by":"crossref","unstructured":"Liang J, Naoumov N, Ross KW (2006) The index poisoning attack in P2P file sharing systems. In: INFOCOM","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"99_CR28","unstructured":"Lou X, Hwang K (2006) Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks (submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks)"},{"key":"99_CR29","unstructured":"Lynn B (2007) On the implementation of pairing-based cryptosystems. PhD thesis, Stanford University"},{"key":"99_CR30","volume-title":"ICC 2009 communication and information systems security symposium","author":"L Maccari","year":"2009","unstructured":"Maccari L, Rosi M, Fantacci R, Chisci L, Milanesio M, Aiello LM (2009) Avoiding eclipse attacks on Kad\/Kademlia: an identity based approach. In: ICC 2009 communication and information systems security symposium. Dresden, Germany"},{"key":"99_CR31","doi-asserted-by":"crossref","unstructured":"Maymounkov P, Mazi\u00e8res D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: IPTPS 2002, pp 53\u201365","DOI":"10.1007\/3-540-45748-8_5"},{"key":"99_CR32","unstructured":"Mislove A, Post A, Reis C, Willmann P, Druschel P, Wallach DS, Bonnaire X, Sens P, Busca JM, Arantes-Bezerra L (2003) POST: a secure, resilient, cooperative messaging system. In: HOTOS\u201903: proceedings of the 9th conference on Hot Topics in Operating Systems. USENIX Association, Berkeley, CA, USA, pp 11\u201311"},{"key":"99_CR33","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/1146847.1146894","volume-title":"InfoScale \u201906: Proceedings of the 1st international conference on scalable information systems","author":"N Naoumov","year":"2006","unstructured":"Naoumov N, Ross K (2006) Exploiting P2P systems for DDoS attacks. In: InfoScale \u201906: Proceedings of the 1st international conference on scalable information systems. ACM, New York, NY, USA, p 47"},{"key":"99_CR34","doi-asserted-by":"crossref","unstructured":"Recordon D, Reed D (2006) Openid 2.0: a platform for user-centric identity management. In: DIM \u201906: proceedings of the second ACM workshop on Digital identity management. ACM, New York, NY, USA, pp 11\u201316. doi: 10.1145\/1179529.1179532","DOI":"10.1145\/1179529.1179532"},{"key":"99_CR35","doi-asserted-by":"crossref","unstructured":"Ross K, Liang J, Naoumov N (2005) Efficient blacklisting and pollution-level estimation in P2P file-sharing systems. In: Proc. of Asian internet engineering conference","DOI":"10.1007\/11599593_1"},{"key":"99_CR36","unstructured":"Rowaihy H, Enck W, McDaniel P, Porta TL (2005) Limiting sybil attacks in structured peer-to-peer networks. Tech. Rep. NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA"},{"key":"99_CR37","first-page":"329","volume-title":"Middleware\u201901: proceedings of the IFIP\/ACM international conference on distributed systems platforms","author":"A Rowstron","year":"2001","unstructured":"Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware\u201901: proceedings of the IFIP\/ACM international conference on distributed systems platforms. Springer-Verlag, London, UK, pp 329\u2013350"},{"key":"99_CR38","doi-asserted-by":"crossref","unstructured":"Rowstron A, Kermarrec AM, Castro M, Druschel P (2001) Scribe: the design of a large-scale event notification infrastructure. In: Proc. of the third international workshop on Networked Group Communication (NGC 2001), pp 30\u201343","DOI":"10.1007\/3-540-45546-9_3"},{"key":"99_CR39","doi-asserted-by":"crossref","unstructured":"Ryu S, Butler K, Traynor P, McDaniel P (2007) Leveraging identity-based cryptography for node id assignment in structured P2P systems. In: Proc. of AINAW \u201907. IEEE Computer Society, Washington, DC, USA, pp 519\u2013524. doi: 10.1109\/AINAW.2007.221","DOI":"10.1109\/AINAW.2007.221"},{"key":"99_CR40","first-page":"47","volume-title":"CRYPTO 84: proceedings of advances in cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir A (1985) Identity based cryptosystems and signature schemes. In: CRYPTO 84: proceedings of advances in cryptology. Springer, New York, NY, USA, pp 47\u201353"},{"key":"99_CR41","volume-title":"Proc. of the 25th IEEE InfoCom 2006","author":"A Singh","year":"2006","unstructured":"Singh A, Ngan TW, Druschel P, Wallach D (2006) Eclipse attacks on overlays: threats and defenses. In: Proc. of the 25th IEEE InfoCom 2006. IEEE Computer Society, Barcelona, Spanien"},{"key":"99_CR42","first-page":"261","volume-title":"IPTPS \u201901: revised papers from the first international workshop on peer-to-peer systems","author":"E Sit","year":"2002","unstructured":"Sit E, Morris R (2002) Security considerations for peer-to-peer distributed hash tables. In: IPTPS \u201901: revised papers from the first international workshop on peer-to-peer systems. Springer, London, UK, pp 261\u2013269"},{"key":"99_CR43","doi-asserted-by":"crossref","unstructured":"Srivatsa M, Xiong L, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW \u201905: 14th international conference on World Wide Web, pp 422\u2013431. doi: 10.1145\/1060745.1060808","DOI":"10.1145\/1060745.1060808"},{"issue":"5","key":"99_CR44","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1290168.1290176","volume":"37","author":"M Steiner","year":"2007","unstructured":"Steiner M, En-Najjary T, Biersack EW (2007) Exploiting KAD: possible uses and misuses. SIGCOMM Comput Commun Rev 37(5):65\u201370","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"99_CR45","doi-asserted-by":"crossref","unstructured":"Steiner M, En-Najjary T, Biersack EW (2007) A global view of KAD. In: IMC \u201907: proc. of the 7th ACM SIGCOMM. ACM, New York, NY, USA, pp 117\u2013122. doi: 10.1145\/1298306.1298323","DOI":"10.1145\/1298306.1298323"},{"key":"99_CR46","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: SIGCOMM \u201901: proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, New York, NY, USA, pp 149\u2013160. doi: 10.1145\/383059.383071","DOI":"10.1145\/383059.383071"},{"key":"99_CR47","unstructured":"Urdaneta G, Pierre G, Van Steen M (2009) A survey of DHT security techniques. ACM Computing Surveys. http:\/\/www.globule.org\/publi\/SDST_acmcs2009.html"},{"key":"99_CR48","doi-asserted-by":"crossref","unstructured":"Wang H, Zhu Y, Hu Y (2005) An efficient and secure peer-to-peer overlay network. In: LCN \u201905: proceedings of the the IEEE conference on local computer networks. IEEE Computer Society, Washington, DC, USA, pp 764\u2013771. doi: 10.1109\/LCN.2005.27","DOI":"10.1109\/LCN.2005.27"},{"key":"99_CR49","unstructured":"Wang P, Osipkov I, Hopper N, Kim Y (2006) Myrmic: secure and robust dht routing. Tech. rep., DTC Research"},{"key":"99_CR50","unstructured":"Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: a near-optimal social network defense against sybil attacks. In: IEEE symposium on security and privacy, 2008. SP 2008, pp 3\u201317"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0099-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-010-0099-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0099-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T15:53:10Z","timestamp":1559922790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-010-0099-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,6]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["99"],"URL":"https:\/\/doi.org\/10.1007\/s12083-010-0099-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,6]]}}}