{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:13:59Z","timestamp":1768562039226,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"07","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2004,7]]},"DOI":"10.1109\/tkde.2004.1318567","type":"journal-article","created":{"date-parts":[[2004,8,2]],"date-time":"2004-08-02T14:56:57Z","timestamp":1091458617000},"page":"858-869","source":"Crossref","is-referenced-by-count":33,"title":["Efficient, Self-Contained Handling of Identity in Peer-to-Peer Systems"],"prefix":"10.1109","volume":"16","author":[{"given":"K.","family":"Aberer","sequence":"first","affiliation":[]},{"given":"A.","family":"Datta","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hauswirth","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44751-2_15"},{"key":"ref2","article-title":"The Quest for Balancing Peer Load in Structured Peer-to-Peer Systems","volume-title":"Technical Report IC\/2003\/32, EPFL","author":"Aberer","year":"2003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2003.1199386"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978368"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"ref9","volume-title":"Clip2, The Gnutella Protocol Specification v0.4 (Document Revision 1.2)","year":"2001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COEC.2003.1210265"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203454"},{"key":"ref13","volume-title":"PGP: Pretty Good Privacy","author":"Garfinkel","year":"1994"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/863997.863998"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/564870.564877"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/503334.503336"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571863"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863999"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/bf01178777"},{"key":"ref21","volume-title":"Mobile IP Design Principles and Practices","author":"Perkins","year":"1998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/258492.258523"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383072"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/12.737682"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317088"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45518-3_18","article-title":"Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems","volume-title":"Proc. IFIP\/ACM Int\u2019l Conf. Distributed Systems Platforms (Middleware)","author":"Rowstron"},{"key":"ref28","volume-title":"Big Book of IPv6 Addressing RFCs (Big Book)","author":"Salus","year":"2000"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref30","article-title":"Tapestry: An Infrastructure for Fault-Tolerant Wide-Are Location and Routing","volume-title":"Technical Report UCB\/CSD-01-1141, University of California, Berkeley","author":"Zhao","year":"2001"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/69\/29215\/01318567.pdf?arnumber=1318567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:50:13Z","timestamp":1742100613000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1318567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":30,"journal-issue":{"issue":"07","published-print":{"date-parts":[[2004,7]]}},"URL":"https:\/\/doi.org\/10.1109\/tkde.2004.1318567","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2004,7]]}}}