{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:35Z","timestamp":1758845135236,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/ipdps.2009.5161178","type":"proceedings-article","created":{"date-parts":[[2009,7,20]],"date-time":"2009-07-20T15:56:45Z","timestamp":1248105405000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Reduction of Quality (RoQ) attacks on structured peer-to-peer networks"],"prefix":"10.1109","author":[{"family":"Yanxiang He","sequence":"first","affiliation":[]},{"family":"Qiang Cao","sequence":"additional","affiliation":[]},{"family":"Yi Han","sequence":"additional","affiliation":[]},{"family":"Libing Wu","sequence":"additional","affiliation":[]},{"family":"Tao Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/PTP.2003.1231533","article-title":"reducing maintenance overhead in dht based peer-to-peer algorithms","author":"xu","year":"2003","journal-title":"Proc Third Int'l Conf Peer-to-Peer Computing (P2P '03)"},{"year":"0","key":"22"},{"year":"0","key":"17"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.204"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320199"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.016"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1379"},{"journal-title":"P2psim A simulator for peer-to-peer protocols","year":"0","key":"16"},{"key":"13","article-title":"a performance vs. cost framework for evaluating dht design tradeoffs under churn","author":"li","year":"2005","journal-title":"Proceedings of the 24th Infocom"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/11608035","article-title":"survive under high churn in structured p2p systems: evaluation and strategy","author":"liu","year":"2006","journal-title":"Lecture Notes in Computer Science (ICCS2006)"},{"year":"0","key":"11"},{"key":"12","first-page":"87","article-title":"comparing the performance of distributed hash tables under churn","author":"li","year":"2004","journal-title":"Proc of the 1st International Workshop on Peer-to-Peer Systems"},{"key":"21","first-page":"1","article-title":"a survey of low-rate denial-of-service attacks","volume":"2","author":"he","year":"2008","journal-title":"Journal of Frontiers of Computer Science & Technology"},{"year":"0","key":"3"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.105"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"7","article-title":"kelips: building an efficient and stable p2p dht through increased memory and background overhead","author":"gupta","year":"2003","journal-title":"Proc of the 2nd Int'l Workshop on P2P Systems"},{"key":"6","first-page":"329","article-title":"pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proc of the 18th IFIP\/ACM Int'l Conf on Distributed Systems Platforms (Middleware"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"8","article-title":"topology-aware routing in structured peer-to-peer overlay networks","author":"castro","year":"2002","journal-title":"FuDiCo 2002 International Workshop on Future Directions in Distributed Computing"}],"event":{"name":"Distributed Processing (IPDPS)","start":{"date-parts":[[2009,5,23]]},"location":"Rome, Italy","end":{"date-parts":[[2009,5,29]]}},"container-title":["2009 IEEE International Symposium on Parallel &amp; Distributed Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5136864\/5160846\/05161178.pdf?arnumber=5161178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:06:58Z","timestamp":1497809218000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5161178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2009.5161178","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}