{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:17:09Z","timestamp":1729667829577,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266529","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Trust-based storage in a Kademlia network infected by Sybils"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Pecori","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"305","article-title":"Sybil-resistant DHT routing","author":"danezis","year":"2005","journal-title":"Proc ESORICS"},{"key":"ref11","article-title":"Applying Certificate-Based Routing to a Kademlia-Based Distributed Hash Table","author":"kohnen","year":"2011","journal-title":"Proceedings of the Third International Conference on Advances in P2P Systems"},{"key":"ref12","article-title":"Reputation Management for DHT-based Collaborative Environments, 4th","author":"fedotova","year":"2008","journal-title":"3rd EURO-NGI Conference on Next Generation Internet Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.03.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2007.53"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.493"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","article-title":"Schlosser and Hector Garcia-Molina, The Eigentrust Algorithm for Reputation Management in P2P Networks","author":"kamvar","year":"2003","journal-title":"Proceedings of the 12th international conference on World Wide Web"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.57"},{"article-title":"Reputation-based Trust Management in Peer-to-Peer File Sharing Systems","year":"2010","author":"mekouar","key":"ref19"},{"journal-title":"The Sybil Attack IPTPS 7th-8th","year":"2002","author":"douceur","key":"ref4"},{"key":"ref27","article-title":"Sophia: Local Trust for Securing Routing in DHTs, 11th IEEE\/ACM","author":"gracia-tinedo","year":"2011","journal-title":"International Symposium on Cluster Cloud and Grid Computing (CCGrid)"},{"key":"ref3","article-title":"Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer system","author":"rowstron","year":"2001","journal-title":"Proc International Conference on Distributed Systems Platforms (Middleware"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BCFIC.2012.6217954"},{"key":"ref5","article-title":"Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM","author":"rowaihy","year":"2007","journal-title":"2007 26thIEEE International Conference on Computer Communications"},{"key":"ref8","article-title":"Security Considerations for Peer-to-Peer Distributed Hash Tables","volume":"2429","author":"sit","year":"0","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363920"},{"key":"ref2","article-title":"Kademlia: A Peer-to-peer Information System Based on the XOR Metric","author":"maymounkov","year":"2002","journal-title":"IPTPS 7th - 8th"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SOFTCOM.2014.7039131"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","article-title":"PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities","volume":"16","author":"xiong","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"journal-title":"Project Hosting on Google Code","year":"2010","author":"agosti","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2010.5680244"},{"key":"ref24","first-page":"428","article-title":"A Model to Quantify the Success of a Sybil Attack Targeting RELOAD\/Chord Resources","author":"uruefia","year":"2013","journal-title":"IEEE Communications Letters"},{"key":"ref23","article-title":"Measuring &#x201C;Sybil attacks&#x201D; in Kademlia-based networks, 9th IEEE\/ACS","author":"liu","year":"2011","journal-title":"International Conference on Computer Systems and Applications (AICCSA)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501977"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TDSC.2014.2315198","article-title":"A denial of service attack to umts networks using sim-less devices","volume":"11","author":"merlo","year":"2014","journal-title":"Dependable and Secure Computing IEEE Transactions on"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266529.pdf?arnumber=7266529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,22]],"date-time":"2022-05-22T06:50:05Z","timestamp":1653202205000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266529","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}