{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:11:40Z","timestamp":1730225500849,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hpdc.2002.1029932","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:14:31Z","timestamp":1056564871000},"page":"321-330","source":"Crossref","is-referenced-by-count":0,"title":["A secure distributed search system"],"prefix":"10.1109","author":[{"family":"Yinglian Xie","sequence":"first","affiliation":[]},{"given":"D.","family":"O'Hallaron","sequence":"additional","affiliation":[]},{"given":"M.K.","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Service location protocol, version 2","author":"guttman","year":"1998","journal-title":"RFC 2165 IETF"},{"journal-title":"Internet draft","year":"0","key":"ref11"},{"journal-title":"Document retrieval over networks wherein ranking and relevance scores are computed at the client for multiple database documents","year":"1997","author":"kirsch","key":"ref12"},{"key":"ref13","article-title":"Foiling the cracker: A survey of, and improvements to, password security","author":"klein","year":"1990","journal-title":"2nd USENIX Security Workshop"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"ref15","article-title":"Selecting cryptographic key sizes","author":"lenstra","year":"2000","journal-title":"Proceedings of the 2000 International Workshop on Practice and Theory in Public Key Cryptography (PKC)"},{"key":"ref16","article-title":"GLIMPSE: A Tool to Search Through Entire File Systems","author":"manber","year":"1993","journal-title":"Technical Report No 34"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"journal-title":"Napster","year":"0","key":"ref18"},{"journal-title":"OASIS","year":"0","key":"ref19"},{"journal-title":"Managing Gigabytes Compressing and Indexing Documents and Images","year":"1999","author":"witten","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313462"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/215206.215327"},{"key":"ref3","article-title":"Freenet: A Distributed Anonymous Information Storage and Retrieval System","author":"clarke","year":"2000","journal-title":"Designing Privacy Enhancing Technologies International Workshop on Design Issues in Anonymity and Unobservability LNCS 2000"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2000.883724"},{"key":"ref29","article-title":"Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing","author":"zhao","year":"2000","journal-title":"Technical Report UCB\/\/CSD-01&#x2013;1141"},{"journal-title":"Crypto","year":"0","author":"dai","key":"ref5"},{"journal-title":"Gnutella Hosts","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312684"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/215206.215328"},{"journal-title":"Google","year":"0","key":"ref9"},{"key":"ref1","article-title":"Harvest: A Scalable, Customizable Discovery and Access System","author":"bowman","year":"1994","journal-title":"Technical Report CU-CS-732&#x2013;94"},{"key":"ref20","article-title":"Secure Password-Based Protocol for Downloading a Private Key","author":"perlman","year":"1999","journal-title":"Proc 1999 Networks and Distributed System Security Symp"},{"journal-title":"RFC","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref24","first-page":"329","article-title":"Scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware)"},{"key":"ref23","article-title":"A method for obtaining digital signatures and public key crypt osystems","volume":"27","author":"rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/35.649334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"}],"event":{"name":"11th IEEE International Symposium on High Performance Distributed Computing","acronym":"HPDC-02","location":"Edinburgh, UK"},"container-title":["Proceedings 11th IEEE International Symposium on High Performance Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7999\/22121\/01029932.pdf?arnumber=1029932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T16:02:30Z","timestamp":1489161750000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1029932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/hpdc.2002.1029932","relation":{},"subject":[]}}