{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:12:16Z","timestamp":1759133536075},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/lcn.2009.5355085","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T13:26:49Z","timestamp":1261661209000},"page":"269-272","source":"Crossref","is-referenced-by-count":32,"title":["Practical security in p2p-based social networks"],"prefix":"10.1109","author":[{"given":"Kalman","family":"Graffi","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Burkhard","family":"Menges","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hartung","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Kovacevic","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Steinmetz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FreePastry","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"ref12","article-title":"Cryptree: A Folder Tree Structure for Cryptographic File Systems","author":"grolimund","year":"2006","journal-title":"Proc IEEE SRDS '06"},{"key":"ref13","article-title":"Plutus &#x2013; Scalable Secure File Sharing on Untrusted Storage","author":"kallahalla","year":"2003","journal-title":"Proc USENIX FAST"},{"journal-title":"Life Social KOM","year":"2009","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"The Design of Rijndael AES&#x2014 The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref16"},{"journal-title":"Freenet Homepage","article-title":"Freenet","year":"2001","key":"ref4"},{"key":"ref3","article-title":"Towards a Common API for Structured Peer-to-Peer Overlays","author":"dabek","year":"2003","journal-title":"Proc of IPTPS '03"},{"journal-title":"Zattoo &#x2013; TV to Go","year":"2007","key":"ref6"},{"journal-title":"Skype","year":"2004","key":"ref5"},{"key":"ref8","article-title":"Super-Peer-Based Routing and Clustering Strategies for RDF-Based P2P Networks","author":"nejdl","year":"2003","journal-title":"Proc of WWW"},{"journal-title":"PPLive &#x2013; The Largest World Wide Internet TV Network","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2008.11"},{"journal-title":"QuaP2P Improvement of the Quality of Peer-to-Peer Systems","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990064"}],"event":{"name":"2009 IEEE 34th Conference on Local Computer Networks (LCN 2009)","start":{"date-parts":[[2009,10,20]]},"location":"Zurich","end":{"date-parts":[[2009,10,23]]}},"container-title":["2009 IEEE 34th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5347306\/5354999\/05355085.pdf?arnumber=5355085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T02:40:23Z","timestamp":1553827223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5355085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcn.2009.5355085","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}