{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:11:28Z","timestamp":1729642288097,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/icccn.2007.4317808","type":"proceedings-article","created":{"date-parts":[[2007,10,3]],"date-time":"2007-10-03T12:23:05Z","timestamp":1191414185000},"page":"128-134","source":"Crossref","is-referenced-by-count":0,"title":["SCUBE: A DoS-Resistant Distributed Search Protocol"],"prefix":"10.1109","author":[{"given":"Souvik","family":"Ray","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2004","author":"rohrer","journal-title":"Mute Simple anonymous file sharing","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/383059.383072"},{"key":"18","first-page":"10","article-title":"Traffic analysis: Protocols, attacks, design issues and open problems","volume":"2009","author":"raymond","year":"2001","journal-title":"LNCS"},{"year":"0","journal-title":"Napster","key":"15"},{"year":"0","journal-title":"Planetlab","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/INFOCOM.2006.232"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/571825.571863"},{"key":"11","article-title":"Random walks in peer-to-peer networks","author":"li","year":"2004","journal-title":"Proceedings of 20th IEEE infocom"},{"key":"12","article-title":"A performance vs. cost framework for evaluating dht design trade-offs under churn","author":"li","year":"2005","journal-title":"Proceedings of The IEEE Infocom"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_25","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"sit","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/359168.359176"},{"key":"22","article-title":"Countering targeted file attacks using locationguard","author":"srivatsa","year":"2005","journal-title":"Proceedings of the 14th USENIX Security Symposium"},{"key":"23","article-title":"Diffie-hellman key distribution extended to group communication","author":"steiner","year":"1996","journal-title":"Proceedings of the 3rd ACM Conference on Computer and Communications Security"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proc of the ACM SIGCOMM 2001"},{"key":"25","article-title":"Peersearch: Efficient information retrieval in peer-to-peer networks","author":"tang","year":"2002","journal-title":"Proc HotNets-I"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1007\/BF02985694"},{"key":"27","first-page":"59","article-title":"Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system","author":"waldman","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/90.836475"},{"key":"29","article-title":"A secure distributed search system","author":"xie","year":"2002","journal-title":"Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"10"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/JSAC.2002.803986"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/CGO.2005.8"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"6","first-page":"67","article-title":"The free haven project: Distributed anonymous storage service","author":"dingledine","year":"2000","journal-title":"Workshop on Design Issues in Anonymity and Unobservability"},{"year":"0","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/INFCOM.1999.749260"},{"year":"0","key":"9"},{"year":"0","journal-title":"Gnutella","key":"8"}],"event":{"name":"2007 16th International Conference on Computer Communications and Networks","start":{"date-parts":[[2007,8,13]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2007,8,16]]}},"container-title":["2007 16th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4317769\/4317770\/04317808.pdf?arnumber=4317808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T19:37:00Z","timestamp":1497728220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4317808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icccn.2007.4317808","relation":{},"subject":[],"published":{"date-parts":[[2007,8]]}}}