{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:44:20Z","timestamp":1750239860084,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366330","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:15:34Z","timestamp":1452186934000},"page":"356-364","source":"Crossref","is-referenced-by-count":5,"title":["FRoDO: Friendly routing over dunbar-based overlays"],"prefix":"10.1109","author":[{"given":"Tobias","family":"Amft","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Guidi","sequence":"additional","affiliation":[]},{"given":"Kalman","family":"Graffi","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7142-5_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6505(1998)6:5<178::AID-EVAN5>3.0.CO;2-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.007"},{"key":"ref14","article-title":"Modeling Users' Activity on Twitter Networks: Validation of Dunbar's Number","volume":"6","author":"gonalves","year":"2011","journal-title":"PLoS ONE"},{"key":"ref15","first-page":"554","article-title":"LifeSocial. KOM: a Secure and P2P-based Solution for Online Social Networks","author":"graffi","year":"2011","journal-title":"Consumer Communications and Networking Conference (CCNC)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2011.6038673"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2013.6641493"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0366-7"},{"key":"ref19","first-page":"425","article-title":"Sprout: P2p routing with social networks","author":"marti","year":"2005","journal-title":"Current Trends in Database Technology - EDBT 2004 Workshops"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8295.2011.02061.x"},{"article-title":"Friend-to-Friend Networks","year":"2000","author":"dan","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of Scaling in Random Networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"ref6","article-title":"Private communication through a network of trusted connections: The dark freenet","author":"clarke","year":"2010","journal-title":"Network"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45563-0_23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.03.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14325-5_27"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.41"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/35.841837"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019258"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric","volume":"2429","author":"maymounkov","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413215"},{"key":"ref26","article-title":"SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks","volume":"abs 1105 74","author":"sharma","year":"2011","journal-title":"CoRR"},{"key":"ref25","article-title":"Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems","author":"rowstron","year":"2001","journal-title":"Proceedings of the International Conference on Distributed Systems Platforms (IFIPIACM Middleware)"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366330.pdf?arnumber=7366330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T23:15:18Z","timestamp":1498259718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366330","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}