{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:51:50Z","timestamp":1747806710005},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/dsn.2004.1311892","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"223-232","source":"Crossref","is-referenced-by-count":15,"title":["Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast"],"prefix":"10.1109","author":[{"given":"G.","family":"Badishi","sequence":"first","affiliation":[]},{"given":"I.","family":"Keidar","sequence":"additional","affiliation":[]},{"given":"A.","family":"Sasson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892324"},{"key":"ref11","first-page":"253","article-title":"Gossip versus deterministically constrained flooding on small networks","author":"lin","year":"2000","journal-title":"Disc"},{"key":"ref12","article-title":"A chum-resistant peer-to-peer web caching system","author":"linga","year":"2003","journal-title":"ACM Workshop on Survivable and Self-Regenerative Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00325-0"},{"key":"ref14","article-title":"Optimal unconditional information diffusion","author":"malkhi","year":"2001","journal-title":"Proc 15th Int'l Symp Distributed Computing (DISC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2001.969758"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0082-4"},{"key":"ref17","article-title":"Inferring Internet denial-of-service activity","author":"moore","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"journal-title":"FIPS Publication 186&#x2013;2","year":"2001","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/0147013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932161"},{"year":"2003","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","article-title":"Lightweight probabilistic broad-cast","author":"eugster","year":"2001","journal-title":"DSN"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312207"},{"article-title":"Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast. TR CCIT 477","year":"2004","author":"badishi","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941427"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"}],"event":{"name":"International Conference on Dependable Systems and Networks, 2004","start":{"date-parts":[[2004,7,1]]},"location":"Florence, Italy","end":{"date-parts":[[2004,7,1]]}},"container-title":["International Conference on Dependable Systems and Networks, 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9172\/29105\/01311892.pdf?arnumber=1311892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T02:10:33Z","timestamp":1489457433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1311892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dsn.2004.1311892","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}