{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:36:19Z","timestamp":1725986179756},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/ifipnetworking.2016.7497223","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:39:03Z","timestamp":1466840343000},"page":"395-403","source":"Crossref","is-referenced-by-count":1,"title":["Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Moreira da Silva","sequence":"first","affiliation":[]},{"given":"Jaime","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Ricardo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 SSYM'04"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851198"},{"key":"ref13","article-title":"Information slicing: Anonymity using unreliable overlays","author":"katti","year":"2007","journal-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design and Implementation NSDI'07"},{"key":"ref14","article-title":"One bad apple spoils the bunch: Exploiting P2P applications to trace and profile Tor users","author":"le blond","year":"2011","journal-title":"Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats LEET' 11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571863"},{"key":"ref16","article-title":"The BitTorrent anonymity marketplace","author":"nielson","year":"2011","journal-title":"CoRR abs\/1108 2718"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.06.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.47"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1461464.1461465"},{"key":"ref6","article-title":"SwarmScreen: Privacy through plausible deniability in P2P systems","author":"choffnes","year":"2009","journal-title":"Northwestern EECS Technical Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0256-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4108\/eai.24-8-2015.2261082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921183"},{"journal-title":"NS-3 Network Simulator","year":"0","key":"ref2"},{"journal-title":"Freenet Project","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18802-7_22"}],"event":{"name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2016,5,17]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,5,19]]}},"container-title":["2016 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7493812\/7497194\/07497223.pdf?arnumber=7497223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T13:52:09Z","timestamp":1475157129000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7497223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2016.7497223","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}