{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T12:38:16Z","timestamp":1723466296883},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/p2p.2014.6934312","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:23:59Z","timestamp":1414801439000},"source":"Crossref","is-referenced-by-count":7,"title":["Censorship-resistant and privacy-preserving distributed web search"],"prefix":"10.1109","author":[{"given":"Michael","family":"Herrmann","sequence":"first","affiliation":[]},{"given":"Ren","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kai-Chun","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1127"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.23"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/571860.571861"},{"key":"18","first-page":"207","article-title":"On the feasibility of peer-to-peer web indexing and search","author":"li","year":"2003","journal-title":"Peer-to-Peer Systems II Volume 2735 of Lecture Notes in Computer Science"},{"key":"15","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"16","first-page":"251","author":"john","year":"2002","journal-title":"The Sybil Attack in Peer-to-peer Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_9"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866921"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108091"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"21","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/SFCS.1997.646125","article-title":"Replication is not needed: Single database, computationally-private information retrieval","author":"kushilevitz","year":"1997","journal-title":"Foundations of Computer Science 1997 Proceedings 38th Annual Symposium on"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"20","first-page":"417","article-title":"Trackmenot: Resisting surveillance in web search","author":"howe","year":"2009","journal-title":"Lessons from the Identity Trail Anonymity Privacy and Identity in a Networked Society"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"1","article-title":"Click: What Millions of People are Doing Online and why it Matters","author":"tancer","year":"2008","journal-title":"Hyperion"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"7","first-page":"53","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"Peer-to-Peer Systems Volume 2429 of Lecture Notes in Computer Science"},{"key":"6","first-page":"10","article-title":"Traffic Analysis: Protocols, attacks, design issues, and open problems","author":"raymond","year":"2001","journal-title":"Designing Privacy Enhancing Technologies Volume 2009 of Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.78"},{"key":"9","article-title":"Description of the yacy distributed web search engine","author":"herrmann","year":"2014","journal-title":"Technical Report KU Leuven ESAT\/COSIC IMinds"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"}],"event":{"name":"2014 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P)","location":"London, United Kingdom","start":{"date-parts":[[2014,9,8]]},"end":{"date-parts":[[2014,9,12]]}},"container-title":["14-th IEEE International Conference on Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6926645\/6934289\/06934312.pdf?arnumber=6934312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T19:25:58Z","timestamp":1498159558000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/p2p.2014.6934312","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}