{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T20:54:02Z","timestamp":1761252842541,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/dsn.2013.6575363","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T12:18:36Z","timestamp":1376482716000},"page":"1-12","source":"Crossref","is-referenced-by-count":8,"title":["Uniform node sampling service robust against collusions of malicious nodes"],"prefix":"10.1109","author":[{"given":"Emmanuelle","family":"Anceaume","sequence":"first","affiliation":[]},{"given":"Yann","family":"Busnel","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Sericola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140295"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(03)00400-6"},{"key":"18","first-page":"328","article-title":"A near-optimal algorithm for computing the entropy of a stream","author":"chakrabarti","year":"2007","journal-title":"ACM-SIAM Symposium on Discrete Algorithms"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807094"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237823"},{"key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45726-7_1","article-title":"Counting distinct elements in a data stream","author":"bar-yossef","year":"2002","journal-title":"Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"11","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-642-17653-1_5","article-title":"Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes","volume":"6490","author":"anceaume","year":"2010","journal-title":"Proceedings of the 14th International Conference on Principles of Distributed Systems (Opodis)"},{"year":"0","key":"12"},{"journal-title":"Distributed Algorithms","year":"1996","author":"lynch","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2012.16"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1145\/1151659.1159931","article-title":"Minimizing churn in distributed systems","author":"godfrey","year":"2006","journal-title":"Proceedings of the ACM SIGCOMM"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"journal-title":"Finite Markov Chains","year":"1976","author":"keneny","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2307\/3214403"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.03.008"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514206"},{"key":"7","article-title":"Detecting malicious beacon nodes for secure location discovery in wireless sensor networks","author":"liu","year":"2005","journal-title":"Proceedings of the 25th IEEE International Conference on Distributed Compltling Systems (ICDCS)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.020"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2001730"},{"key":"4","first-page":"123","article-title":"Peer counting and sanlpling in overlay networks: Random walk methods","author":"massoulie","year":"2006","journal-title":"Proceedings of the 25th Annual Symposium on Principles of Distributed Compltling (PODC)"},{"key":"9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"}],"event":{"name":"2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2013,6,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,27]]}},"container-title":["2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6569391\/6575287\/06575363.pdf?arnumber=6575363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T20:15:44Z","timestamp":1563653744000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6575363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dsn.2013.6575363","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}