{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:51Z","timestamp":1767339351330,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icpads.2007.4447808","type":"proceedings-article","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T18:50:12Z","timestamp":1216752612000},"page":"1-8","source":"Crossref","is-referenced-by-count":99,"title":["S\/Kademlia: A practicable approach towards secure key-based routing"],"prefix":"10.1109","author":[{"given":"Ingmar","family":"Baumgart","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Mies","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"167","article-title":"Broose: a practical distributed hashtable based on the de-bruijn topology","author":"gai","year":"2004","journal-title":"Fourth International Conference on Peer-to-Peer Computing 2004"},{"key":"ref11","first-page":"53","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","volume":"2429 2002","author":"maymounkov","year":"2002","journal-title":"Peer-to-Peer Systems First InternationalWorkshop IPTPS 2002 Cambridge"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/11558989_4","article-title":"A taxonomy of rational attacks","author":"nielson","year":"2005","journal-title":"4th International Workshop on Peer-to-Peer Systems"},{"year":"2005","author":"rowaihy","article-title":"Limiting sybil attacks in structured peer-to-peer networks","key":"ref13"},{"key":"ref14","first-page":"329","article-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","volume":"2218 2001","author":"rowstron","year":"2001","journal-title":"Middleware 2001 IFIP\/ACM International Conference on Distributed Systems Platforms Heidelberg Germany November 12&#x2013;16 2001 Proceedings"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref16","first-page":"261","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"sit","year":"0","journal-title":"IPTPS '02 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CSAC.2004.50"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TNET.2002.808407"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/GLOCOM.2005.1577956"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/844128.844156","article-title":"Secure routing for structured peer-to-peer overlay networks","volume":"36","author":"castro","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref6","first-page":"33","article-title":"Towards a common api for structured peer-to-peer overlays","volume":"2735 2003","author":"dabek","year":"2003","journal-title":"Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03)"},{"key":"ref5","article-title":"An analysis of two bittorrent distributed trackers","author":"crosby","year":"2006","journal-title":"Presentation at the South Central Information Security Symposium (SCISS '06)"},{"key":"ref8","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"0","journal-title":"IPTPS '02 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"ref7","first-page":"756","article-title":"Defending the sybil attack in p2p networks","volume":"0","author":"dinger","year":"2006","journal-title":"Taxonomy challenges and a proposal for self-registration ares"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/GI.2007.4301435"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1007\/11561071_71","article-title":"Making chord robust to byzantine attacks","author":"fiat","year":"2005","journal-title":"ESA Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1145\/1148109.1148163","article-title":"Towards a scalable and robust dht","author":"awerbuch","year":"2006","journal-title":"SPAA '06 Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures"}],"event":{"name":"2007 International Conference on Parallel and Distributed Systems","start":{"date-parts":[[2007,12,5]]},"location":"Hsinchu, Taiwan","end":{"date-parts":[[2007,12,7]]}},"container-title":["2007 International Conference on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4447704\/4447779\/04447808.pdf?arnumber=4447808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:14:30Z","timestamp":1497780870000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4447808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icpads.2007.4447808","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}