{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:09:30Z","timestamp":1725487770055},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550345","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"283-292","source":"Crossref","is-referenced-by-count":3,"title":["Using recurring costs for reputation management in peer-to-peer streaming systems"],"prefix":"10.1109","author":[{"given":"Michael","family":"Rossberg","sequence":"first","affiliation":[]},{"given":"Guenter","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref13","article-title":"A survey of solutions to the sybil attack","author":"levine","year":"2006","journal-title":"University of Massachusetts Amherst Amherst MA Tech report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45229-4_21"},{"key":"ref4","first-page":"298","article-title":"SplitStream: High-bandwidth content distribution in a cooperative environment","author":"castro","year":"2003","journal-title":"Proceedings of (IPTPS'03)"},{"key":"ref3","first-page":"151","article-title":"Client puzzles: A cryptographic countermeasure against connection depletion attacks","author":"juels","year":"1999","journal-title":"Proceedings of NDSS '99 (Networks and Distributed Systems Security)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637220"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254745"},{"journal-title":"Hashcash - a denial of service counter-measure","year":"2002","author":"back","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"ref2","article-title":"Incentives build robustness in bittorrent","author":"cohen","year":"2003","journal-title":"First Workshop on the Economics of Peer-to-Peer Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803066"},{"key":"ref9","first-page":"170","article-title":"Dos-resistant authentication with client puzzles","author":"aura","year":"2001","journal-title":"Revised Papers from the 8th International Workshop on Security Protocols"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550345.pdf?arnumber=4550345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:26:30Z","timestamp":1497777990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550345","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}