{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:34:06Z","timestamp":1725410046293},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5501977","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T14:22:30Z","timestamp":1278944550000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems"],"prefix":"10.1109","author":[{"given":"O.","family":"Jetter","sequence":"first","affiliation":[]},{"given":"J.","family":"Dinger","sequence":"additional","affiliation":[]},{"given":"H.","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"The economics of botnets","year":"2009","author":"namestnikov","key":"ref32"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/3-540-45748-8_25","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"sit","year":"2002","journal-title":"IPTPS '02 Proceedings of the 1st International Workshop on Peer-to-Peer Systems"},{"article-title":"Crawling Azureus","year":"2008","author":"steiner","key":"ref30"},{"key":"ref10","article-title":"RFC 4291: IP version 6 addressing archi-tecture","author":"hinden","year":"2006","journal-title":"IETF"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.47"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/11555827_18","article-title":"Sybil-resistant DHT routing","author":"danezis","year":"2005","journal-title":"ESORICS 2005 10th European Symposium on Research in Computer Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.328"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"IPTPS '02 Proceedings of the 1st International Workshop on Peer-to-Peer Systems"},{"article-title":"BitTorrent protocol spec., bep 5: DHT protocol (draft, v. 11031)","year":"2008","author":"loewenstern","key":"ref18"},{"article-title":"An analysis of BitTorrent's two Kademlia-based DHTs","year":"2007","author":"crosby","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.45"},{"article-title":"A survey of solutions to the Sybil attack","year":"2006","author":"levine","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320196"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref6","article-title":"A survey of DHT security techniques","author":"urdaneta","year":"2009","journal-title":"To Appear in ACM Computing Surveys"},{"year":"2009","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.02.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"ref7","first-page":"321","article-title":"Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks","author":"hildrum","year":"2003","journal-title":"Proc of 17th Int-l Symp on Distributed Computing (DISC)"},{"year":"2009","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"year":"2009","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298325"},{"year":"2009","key":"ref22"},{"key":"ref21","first-page":"31","article-title":"Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use","author":"qiao","year":"2006","journal-title":"ATEC'06 Proc of the Annual Conf on USENIX'06 Annual Technical Conf USENIX Association"},{"article-title":"The potential of peer-to-peer networks and systems: Archi-tectures, robustness and legal classification (in German)","year":"2009","author":"dinger","key":"ref24"},{"year":"2009","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GI.2007.4301435"},{"year":"2009","key":"ref25"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05501977.pdf?arnumber=5501977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:43:03Z","timestamp":1497868983000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5501977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5501977","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}