{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:50:11Z","timestamp":1729666211878,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/softcom.2014.7039131","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:43:41Z","timestamp":1424202221000},"page":"279-283","source":"Crossref","is-referenced-by-count":6,"title":["Trust-based routing for Kademlia in a sybil scenario"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Pecori","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luca","family":"Veltri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Applying Certificate-Based Routing to a Kademlia-Based Distributed Hash Table","author":"kohnen","year":"2011","journal-title":"Proceedings of the Third International Conference on Advances in P2P Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2008.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.03.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2007.53"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.493"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.57"},{"journal-title":"Reputation-Based Trust Management in Peer-to-Peer File Sharing Systems","year":"2010","author":"mekouar","key":"ref19"},{"key":"ref4","article-title":"The Sybil Attack","author":"douceur","year":"2002","journal-title":"IPTPS 7th - 8th"},{"key":"ref3","article-title":"Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer system","author":"rowstron","year":"2001","journal-title":"Proc of the 18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware 2001)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363920"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BCFIC.2012.6217954"},{"key":"ref8","article-title":"A Survey of Solutions to the Sybil Attack","author":"levine","year":"2006","journal-title":"Technical Report"},{"key":"ref7","article-title":"Security Considerations for Peer-to-Peer Distributed Hash Tables","volume":"2429","author":"sit","year":"0","journal-title":"Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Kademlia: A Peer-to-peer Information System Based on the XOR Metric","author":"maymounkov","year":"2002","journal-title":"IPTPS 7th - 8th"},{"key":"ref9","first-page":"305","article-title":"Sybil-resistant DHT routing","author":"danezis","year":"2005","journal-title":"Proc ESORICS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","article-title":"PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities","volume":"16","author":"xiong","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref22","article-title":"Measuring &#x201C;Sybil attacks&#x201D; in Kademlia-based networks","author":"liu","year":"2011","journal-title":"9th IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)"},{"article-title":"Deus-project hosting on google code [online]","year":"2010","author":"agosti","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501977"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.011113.122220"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2011.57"}],"event":{"name":"2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2014,9,17]]},"location":"Split, Croatia","end":{"date-parts":[[2014,9,19]]}},"container-title":["2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027280\/7039053\/07039131.pdf?arnumber=7039131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:43:46Z","timestamp":1498196626000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7039131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/softcom.2014.7039131","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}