{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:03:16Z","timestamp":1730232196413,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5502010","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T10:22:30Z","timestamp":1278930150000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Resilient Suppressor Mechanism against Illegal Content Redistribution on Peer-to-Peer Video Sharing Networks"],"prefix":"10.1109","author":[{"given":"Y.","family":"Kawahara","sequence":"first","affiliation":[]},{"given":"L.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"T.","family":"Asami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"358","article-title":"Overlay Weaver: An Overlay Construction Toolkit","volume":"47","author":"shudo","year":"2006","journal-title":"Trans of IPSJ"},{"journal-title":"Queuing Systems Volume I Theory","year":"1975","author":"kleinrock","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244340"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"},{"key":"ref4","first-page":"49","article-title":"Digital Rights Management for Content Distribution","volume":"21","author":"liu","year":"2003","journal-title":"Proc of the Australasian Information Security Workshop Conference on ACSW Frontiers"},{"journal-title":"Copyright Policies that Respond to a New Era","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref5","first-page":"2464","article-title":"An Implementating Evaluation of an Efficient Key Management Method in a P2P File Sharing System","volume":"47","author":"ohtsu","year":"2006","journal-title":"JIPSJ"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref7","first-page":"329","article-title":"Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems","author":"rowstron","year":"2001","journal-title":"Proc of the IFIP\/ACM International Conference on Distributed Systems Platforms Heidelberg"},{"key":"ref2","article-title":"Commercial P2P and Its Problems","volume":"92","author":"asami","year":"2009","journal-title":"Journal of IEICE"},{"journal-title":"Approaching the Zettabyte Era White Paper","year":"2008","key":"ref1"},{"key":"ref9","first-page":"313","article-title":"Safeguarding Cryptographic Keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc of AFIPS National Computer Conference"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05502010.pdf?arnumber=5502010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T19:05:16Z","timestamp":1489863916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5502010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5502010","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}