{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:50:21Z","timestamp":1730292621657,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/rivf.2009.5174658","type":"proceedings-article","created":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T11:33:46Z","timestamp":1248867226000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Robust Overlay Network with Self-Adaptive Topology: The Reliable File Storage Layer"],"prefix":"10.1109","author":[{"given":"Loic","family":"Baud","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/24.387393"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2007.75"},{"key":"18","first-page":"374","volume":"0","author":"pham","year":"2008","journal-title":"Towards a Security Cockpit"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844132"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/502051.502054"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2008.4586348"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"3","first-page":"53","article-title":"kademlia: a peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"IMC '07 Proceedings of the 7th ACM SIGCOMM conference on Internet measurement"},{"key":"20","article-title":"an algorithm for differential file comparison","author":"mcllroy","year":"1976","journal-title":"Technical Report Computing Science Technical Report No 41"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2004.14"},{"key":"1","first-page":"49","author":"pendarakis","year":"2001","journal-title":"Marcel Waldvogel Almi An application level multicast infrastructure"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502048"},{"key":"6","first-page":"303","article-title":"tor: the second-generation onion router","author":"dingledine","year":"2004","journal-title":"In Proceedings of the 13th USENIX Security Symposium"},{"key":"5","article-title":"global intrusion detection in the domino overlay system","author":"yegneswaran","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_3"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.77"}],"event":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","start":{"date-parts":[[2009,7,13]]},"location":"Danang City, Viet Nam","end":{"date-parts":[[2009,7,17]]}},"container-title":["2009 IEEE-RIVF International Conference on Computing and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5174598\/5174599\/05174658.pdf?arnumber=5174658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:28:17Z","timestamp":1489768097000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5174658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/rivf.2009.5174658","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}