{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:38:10Z","timestamp":1774373890466,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,1,1]]},"DOI":"10.1109\/tdsc.2016.2530720","type":"journal-article","created":{"date-parts":[[2016,2,16]],"date-time":"2016-02-16T19:15:31Z","timestamp":1455650131000},"page":"54-68","source":"Crossref","is-referenced-by-count":34,"title":["GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks"],"prefix":"10.1109","volume":"15","author":[{"given":"Xianfu","family":"Meng","sequence":"first","affiliation":[]},{"given":"Dongxu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"STTM: Similarity Transitivity chain based trust model in P2P environment","author":"zhen","year":"0","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref38","first-page":"13","article-title":"Leveraging social and content-based recommendation in P2P systems","author":"draidi","year":"0","journal-title":"Proc 3rd Int Conf Adv P2P Syst"},{"key":"ref33","article-title":"PeerSim[EB\/OL]","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF02831798"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_6"},{"key":"ref30","first-page":"933","article-title":"Multicast and bulk lookup in structured overlay networks","author":"ali","year":"2010","journal-title":"Handbook of Peer-to-Peer Networking"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/TMM.2015.2402516","article-title":"Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming","volume":"17","author":"attilio","year":"2015","journal-title":"IEEE Trans Multimedia"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.48"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2329015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2014.283"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.74"},{"key":"ref11","first-page":"1988","author":"magno","year":"1988","journal-title":"Guarantee Schemes An Alternative to the Supervised Credit Program"},{"key":"ref12","first-page":"102","article-title":"A trust management model based on recommendation for P2P network","volume":"27","author":"wei","year":"2010","journal-title":"Comput Simul"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.2.357-360"},{"key":"ref15","first-page":"1","article-title":"SocialTrust: Enabling long-term social cooperation in peer-to-peer services","volume":"7","author":"hu","year":"2013","journal-title":"Peer-to-Peer Netw Appl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.06.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1360\/jos182551"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-011-0106-6"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/s12083-010-0069-z","article-title":"Trust-based exchange of services to motivate cooperation in P2P networks","volume":"4","author":"anna","year":"2011","journal-title":"Peer-to-Peer Netw Appl"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2008.00001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.032"},{"key":"ref3","article-title":"edonkey2000","year":"2000"},{"key":"ref6","first-page":"1","article-title":"Securing network coding against pollution attacks in P2P converged ubiquitous networks","volume":"8","author":"he","year":"2013","journal-title":"Peer-to-Peer Netw Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016..2010.00345"},{"key":"ref5","first-page":"689","article-title":"Reputation-based trust management in peer-to-peer systems: Taxonomy and anatomy","author":"loubna","year":"2010","journal-title":"Handbook of Peer-to-Peer Networking"},{"key":"ref8","first-page":"571","article-title":"A recommendation-based peer-to-peer trust model","volume":"15","author":"dou","year":"2004","journal-title":"J Softw"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref2","article-title":"Gnutella","year":"2000"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.444"},{"key":"ref1","article-title":"BitTorrent","year":"2003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-010-0074-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_25"},{"key":"ref21","first-page":"245","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"storica","year":"0","journal-title":"Proc Conf Appl Technol Archit Protocols Comput Commun"},{"key":"ref24","article-title":"Achord: A variant of the chord lookup service for use in censorship resistant peer-to-peer publishing systems","author":"hazel","year":"0","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"ref23","first-page":"124","article-title":"Research on trust data storage technology in P2P network","volume":"40","author":"zhang","year":"2012","journal-title":"Digital Computer Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.09.015"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8259029\/07407618.pdf?arnumber=7407618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:41:49Z","timestamp":1642005709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7407618\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2530720","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}