{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:44:38Z","timestamp":1742798678089,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2004.1334930","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:27:50Z","timestamp":1099913270000},"page":"45-52","source":"Crossref","is-referenced-by-count":22,"title":["PKI-based security for peer-to-peer information sharing"],"prefix":"10.1109","author":[{"given":"K.","family":"Berket","sequence":"first","affiliation":[]},{"given":"A.","family":"Essiari","sequence":"additional","affiliation":[]},{"given":"A.","family":"Muratas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"The TLS protocol version 1.0","volume":"2246","year":"0","journal-title":"IETF RFC"},{"journal-title":"Waste","year":"0","key":"16"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1109\/PTP.2003.1231514","article-title":"TrustMe: Anonymous management of trust relationships in decentralized P2P systems","author":"singh","year":"2003","journal-title":"Proceedings of the Third International IEEE Conference on Peer-to-Peer Computing"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950196"},{"journal-title":"Kazaa Media Desktop","year":"0","key":"11"},{"journal-title":"Limewire the Most Sophisticated File-sharing Application","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00036-5"},{"key":"2","article-title":"A New security model for collaborative environments","author":"agarwal","year":"2003","journal-title":"Proc 3rd Workshop on Advanced Collaborative Environments"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2001.935350"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"journal-title":"The Secure Group Communication Protocol Version 2","year":"0","author":"egles","key":"7"},{"key":"6","article-title":"The free haven project: Distributed anonymous storage service","author":"dingledine","year":"2000","journal-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44702-4_4","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.2172\/805133","author":"chevassut","year":"2002","journal-title":"Authenticated Group Diffie-Hellman Key Exchange Theory and Practice"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","location":"Zurich, Switzerland"},"container-title":["Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9261\/29415\/01334930.pdf?arnumber=1334930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,19]],"date-time":"2018-12-19T03:02:43Z","timestamp":1545188563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ptp.2004.1334930","relation":{},"subject":[]}}