{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:56:47Z","timestamp":1729652207183,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2004.1334928","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:27:50Z","timestamp":1099913270000},"page":"28-35","source":"Crossref","is-referenced-by-count":6,"title":["Information leak in the chord lookup protocol"],"prefix":"10.1109","author":[{"given":"C.W.","family":"O'Donnell","sequence":"first","affiliation":[]},{"given":"V.","family":"Vaikuntanathan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/502051.502054"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978368"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1109\/TNET.2002.808407","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","volume":"11","author":"stoica","year":"2003","journal-title":"IEEE Transactions on Networking"},{"journal-title":"Anonymity in Structured Peer-to-Peer Networks","year":"2003","author":"borisov","key":"1"},{"journal-title":"Anonymity in Chord","year":"2002","author":"kumar","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"4","article-title":"Towards measuring anonymity","author":"diaz","year":"2002","journal-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)"},{"key":"9","article-title":"Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design","volume":"6","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Computing Journal"},{"key":"8","article-title":"Crowds: Anonymity for web transactions","volume":"6","author":"michael","year":"1998","journal-title":"ACM TISSEC"},{"key":"11","article-title":"An analysis of the degradation of anonymous protocols","author":"wright","year":"2002","journal-title":"ISOC Symposium on Network and Distributed System Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"}],"event":{"name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","location":"Zurich, Switzerland"},"container-title":["Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9261\/29415\/01334928.pdf?arnumber=1334928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:37:37Z","timestamp":1497598657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ptp.2004.1334928","relation":{},"subject":[]}}