{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:19:03Z","timestamp":1725578343409},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/icccn52240.2021.9522261","type":"proceedings-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T20:31:47Z","timestamp":1630441907000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Applying Harary Graph Structures to the Overlay Network Kademlia"],"prefix":"10.1109","author":[{"given":"Henner","family":"Heck","sequence":"first","affiliation":[]},{"given":"Arno","family":"Wacker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Topics in Structural Graph Theory","year":"2013","author":"beineke","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.101"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93767-0_8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284506"},{"journal-title":"Peersim kademlia code","year":"2010","author":"furlan","key":"ref14"},{"journal-title":"Network optimization library","year":"2006","author":"goldberg","key":"ref15"},{"journal-title":"Protecting Tor from Sybil attacks - Relay Churn","year":"2016","author":"winter","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0294-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref4","article-title":"Bittorrent Enhancement Protocol 5: DHT Protocol","author":"loewenstern","year":"2008","journal-title":"bittorrent org"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883615"},{"key":"ref6","first-page":"401","article-title":"I2P data communication system","author":"zantout","year":"2011","journal-title":"ICN"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152449"},{"journal-title":"Tor Project","year":"2019","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.02.001"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric","author":"maymounkov","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.48.7.1142"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2014.244"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40026-5_17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2017.34"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDCS.2001.918685"}],"event":{"name":"2021 International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2021,7,19]]},"location":"Athens, Greece","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521949\/9522143\/09522261.pdf?arnumber=9522261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:21Z","timestamp":1652197521000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9522261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccn52240.2021.9522261","relation":{},"subject":[],"published":{"date-parts":[[2021,7]]}}}