{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:20:31Z","timestamp":1725409231764},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/netsys.2015.7089070","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T16:32:28Z","timestamp":1429720348000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Integrating churn into the formal analysis of routing algorithms"],"prefix":"10.1109","author":[{"given":"Stefanie","family":"Roos","sequence":"first","affiliation":[]},{"given":"Giang T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-2258-1_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320196"},{"key":"ref14","article-title":"Gnunet-a truly anonymous networking infrastructure","author":"bennett","year":"2002","journal-title":"PETS"},{"journal-title":"X-vine Secure and pseudonymous routing in dhts using social networks","year":"2012","author":"mittal","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.28"},{"key":"ref4","article-title":"Analytical study on improving dht lookup performance under churn","author":"wu","year":"2006","journal-title":"P2P"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12200-2_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064217"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639714"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.329"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330113"}],"event":{"name":"2015 International Conference and Workshops on Networked Systems (NetSys)","start":{"date-parts":[[2015,3,9]]},"location":"Cottbus, Germany","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 International Conference and Workshops on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083793\/7089054\/07089070.pdf?arnumber=7089070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:02:45Z","timestamp":1498197765000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7089070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/netsys.2015.7089070","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}