{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:23:32Z","timestamp":1729664612531,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccw.2013.6649452","type":"proceedings-article","created":{"date-parts":[[2013,11,2]],"date-time":"2013-11-02T00:36:40Z","timestamp":1383352600000},"page":"1378-1382","source":"Crossref","is-referenced-by-count":0,"title":["Copyright protection in Peer-to-Peer networks for Video-on-Demand streaming"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Bernardini","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Rinaldo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Basic Algebra I","year":"1985","author":"jacobson","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202763"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.5402\/2011\/898254"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.839623"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0095-2"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2010.24033"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784956"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0843-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2006.364920"},{"key":"3","article-title":"Do incentives build robustness in BitTorrent?","author":"piatek","year":"2007","journal-title":"Proceedings of 4thUSENIX Symposium on Networked Systems Design & Implementation (NSDI 2007)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.374428"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on Gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/571860.571861"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071205"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177105"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.015"}],"event":{"name":"2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC)","start":{"date-parts":[[2013,6,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications Workshops (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637583\/6649166\/06649452.pdf?arnumber=6649452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:19:21Z","timestamp":1498094361000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6649452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccw.2013.6649452","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}