{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:16:33Z","timestamp":1729642593949,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscit.2014.7011922","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:36:49Z","timestamp":1421869009000},"page":"308-312","source":"Crossref","is-referenced-by-count":0,"title":["A passive monitoring model for P2P network based on 2D Bloom Filter data verification algorithm"],"prefix":"10.1109","author":[{"family":"Shengbing Zhang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"1532","article-title":"Is p2p dying or just hiding?[c","author":"karagiannis","year":"2004","journal-title":"Proc IEEE Comm Soc"},{"key":"2","first-page":"13","article-title":"Diagnosing network-wide p2p live streaming inefficiencies[j]","volume":"8","author":"wu","year":"2012","journal-title":"ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP"},{"key":"10","first-page":"1","author":"carlson","year":"2013","journal-title":"P2P Transfer Using Prepaid Card"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1360\/jos172131"},{"key":"7","first-page":"1","article-title":"Theory and network applications of dynamic bloom filters[c","author":"guo","year":"2006","journal-title":"Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communications Soci Eties"},{"key":"6","first-page":"777","article-title":"The method of p2p traffic detecting for p2p harmful contents prevention[c","author":"lee","year":"2005","journal-title":"Proc of the International Conference on Advanced Communication Technology"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.9781\/ijimai.2013.2211","article-title":"Legal issues concerning p2p exchange of educati onal materials and their impact on e-learning multi-Agent systems[J]","volume":"2","author":"gil","year":"2013","journal-title":"Int J Artif Intell Interact Multimedia"},{"key":"4","first-page":"289","article-title":"Bspm: A new mechanism for overlap-matching expressions\" in dpi[J]","volume":"27","author":"li","year":"2010","journal-title":"Journal of Electronics"},{"key":"9","first-page":"451","article-title":"A fuzzy-based system for evaluation of trustworthiness for p2p communication in jxtaoverlay [m","author":"kik","year":"2013","journal-title":"Information Technology Convergence"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"11","first-page":"1","article-title":"The biometric signature delegation scheme to balan ce the load of digital signing in hybrid p2p networks[J]","author":"yun","year":"2014","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851198"}],"event":{"name":"2014 14th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2014,9,24]]},"location":"Incheon, South Korea","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 14th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000610\/7011852\/07011922.pdf?arnumber=7011922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:37Z","timestamp":1498190617000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscit.2014.7011922","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}