{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:36Z","timestamp":1763467836520,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314339","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"31-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Making p2p accountable without losing privacy"],"prefix":"10.1145","author":[{"given":"Mira","family":"Belenkiy","sequence":"first","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Melissa","family":"Chase","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"C. Chris","family":"Erway","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"John","family":"Jannotti","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Alptekin","family":"K\u00fcp\u00e7\u00fc","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Anna","family":"Lysyanskaya","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Eric","family":"Rachlin","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Free riding on gnutella. First Monday, 5(10)","author":"Adar E.","year":"2000","unstructured":"E. Adar and B. A. Huberman . Free riding on gnutella. First Monday, 5(10) , 2000 . E. Adar and B. A. Huberman. Free riding on gnutella. First Monday, 5(10), 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"ICDCS \u00bf04","author":"Anagnostakis K. G.","year":"2004","unstructured":"K. G. Anagnostakis and M. B. Greenwald . Exchange-based incentive mechanisms for peer-to-peer file sharing . In ICDCS \u00bf04 , 2004 . K. G. Anagnostakis and M. B. Greenwald. Exchange-based incentive mechanisms for peer-to-peer file sharing. In ICDCS \u00bf04, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080198"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839935"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Bao F.","year":"1998","unstructured":"F. Bao , R. Deng , and W. Mao . Efficient and practical fair exchange protocols with off-line ttp . In IEEE Symposium on Security and Privacy , May 1998 . F. Bao, R. Deng, and W. Mao. Efficient and practical fair exchange protocols with off-line ttp. In IEEE Symposium on Security and Privacy, May 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.328"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497907"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704437"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_12_1","volume-title":"Plenum Press","author":"Chaum D.","year":"1983","unstructured":"D. Chaum . Blind signatures for untraceable payments. In Advances in Cryptology \u00bf CRYPTO \u00bf82, pages 199\u00bf-203 . Plenum Press , 1983 . D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology \u00bf CRYPTO \u00bf82, pages 199\u00bf-203. Plenum Press, 1983."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-4730-9","volume-title":"Advances in Cryptology \u00bf CRYPTO \u00bf83, page 153","author":"Chaum D.","year":"1984","unstructured":"D. Chaum . Blind signature systems . In Advances in Cryptology \u00bf CRYPTO \u00bf83, page 153 . Plenum Press , 1984 . D. Chaum. Blind signature systems. In Advances in Cryptology \u00bf CRYPTO \u00bf83, page 153. Plenum Press, 1984."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251990.1253396"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. 2nd IPTPS","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives build robustness in bittorrent . In Proc. 2nd IPTPS , Berkeley, CA , Feb. 2003 . B. Cohen. Incentives build robustness in bittorrent. In Proc. 2nd IPTPS, Berkeley, CA, Feb. 2003."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/503048.503055"},{"key":"e_1_3_2_1_17_1","first-page":"2","volume-title":"Reputation","author":"Dingledine R.","year":"2003","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . Reputation in p 2 p anonymity systems. In P 2PECON \u00bf03, June 2003 . R. Dingledine, N. Mathewson, and P. Syverson. Reputation in p2p anonymity systems. In P2PECON \u00bf03, June 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320217"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134723"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501193"},{"key":"e_1_3_2_1_25_1","unstructured":"GreedyTorrent. http:\/\/www.greedytorrent.com\/.  GreedyTorrent. http:\/\/www.greedytorrent.com\/."},{"key":"e_1_3_2_1_26_1","volume-title":"6th International Conference","author":"Ioannidis J.","year":"2002","unstructured":"J. Ioannidis , S. Ioannidis , A. D. Keromytis , and V. Prevelakis . Fileteller: Paying and getting paid for file storage. In Financial Cryptography , 6th International Conference , 2002 . J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. Fileteller: Paying and getting paid for file storage. In Financial Cryptography, 6th International Conference, 2002."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080194"},{"key":"e_1_3_2_1_28_1","volume-title":"EUROCRYPT \u00bf95","author":"Jakobsson M.","year":"1995","unstructured":"M. Jakobsson . Ripping coins for a fair exchange . In EUROCRYPT \u00bf95 , 1995 . M. Jakobsson. Ripping coins for a fair exchange. In EUROCRYPT \u00bf95, 1995."},{"key":"e_1_3_2_1_29_1","volume-title":"P2PECON \u00bf05","author":"Jun S.","year":"2005","unstructured":"S. Jun and M. Ahamad . Incentives in bittorrent induce free riding . In P2PECON \u00bf05 , Aug. 2005 . S. Jun and M. Ahamad. Incentives in bittorrent induce free riding. In P2PECON \u00bf05, Aug. 2005."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134723"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.63"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254919"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of the 7th OSDI","author":"Li H.","year":"2006","unstructured":"H. Li , A. Clement , E. Wong , J. Napper , I. Roy , L. Alvisi , and M. Dahlin . BAR gossip . In Proc. of the 7th OSDI , Nov. 2006 . H. Li, A. Clement, E. Wong, J. Napper, I. Roy, L. Alvisi, and M. Dahlin. BAR gossip. In Proc. of the 7th OSDI, Nov. 2006."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. 5th IPTPS","author":"Liogkas N.","year":"2006","unstructured":"N. Liogkas , R. Nelson , E. Kohler , and L. Zhang . Exploiting bittorrent for fun (but not profit) . In Proc. 5th IPTPS , 2006 . N. Liogkas, R. Nelson, E. Kohler, and L. Zhang. Exploiting bittorrent for fun (but not profit). In Proc. 5th IPTPS, 2006."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. 5th Workshop on Hot Topics in Networking (HotNets-V)","author":"Locher T.","year":"2006","unstructured":"T. Locher , P. Moor , S. Schmid , and R. Wattenhofer . Free Riding in BitTorrent is Cheap . In Proc. 5th Workshop on Hot Topics in Networking (HotNets-V) , Nov. 2006 . T. Locher, P. Moor, S. Schmid, and R. Wattenhofer. Free Riding in BitTorrent is Cheap. In Proc. 5th Workshop on Hot Topics in Networking (HotNets-V), Nov. 2006."},{"key":"e_1_3_2_1_36_1","first-page":"2","volume-title":"Identity crisis: Anonymity vs. reputation","author":"Marti S.","year":"2003","unstructured":"S. Marti and H. Garcia-Molina . Identity crisis: Anonymity vs. reputation in p 2 p systems. In P 2P \u00bf03, 2003 . S. Marti and H. Garcia-Molina. Identity crisis: Anonymity vs. reputation in p2p systems. In P2P \u00bf03, 2003."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"e_1_3_2_1_38_1","first-page":"278","volume-title":"CRYPTO \u00bf87","author":"Merkle R.","year":"1987","unstructured":"R. Merkle . A digital signature based on a conventional encryption function. In CRYPTO \u00bf87 , pages 269\u00bf- 278 , 1987 . R. Merkle. A digital signature based on a conventional encryption function. In CRYPTO \u00bf87, pages 269\u00bf-278, 1987."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. 4th USENIX\/ACM NSDI","author":"Michalakis N.","year":"2007","unstructured":"N. Michalakis , R. Soul\u00e9 , and R. Grimm . Ensuring content integrity for untrusted peer-to-peer content distribution networks . In Proc. 4th USENIX\/ACM NSDI , Apr. 2007 . N. Michalakis, R. Soul\u00e9, and R. Grimm. Ensuring content integrity for untrusted peer-to-peer content distribution networks. In Proc. 4th USENIX\/ACM NSDI, Apr. 2007."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/11587552_14"},{"key":"e_1_3_2_1_41_1","unstructured":"T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO \u00bf91.   T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO \u00bf91."},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. 4th USENIX\/ACM NSDI","author":"Piatek M.","year":"2007","unstructured":"M. Piatek , T. Isdal , T. Anderson , A. Krishnamurthy , and A. Venkataramani . Do incentives build robustness in bittorrent ? In Proc. 4th USENIX\/ACM NSDI , Apr. 2007 . M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in bittorrent? In Proc. 4th USENIX\/ACM NSDI, Apr. 2007."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_26"},{"key":"e_1_3_2_1_44_1","unstructured":"Rosetta@Home. http:\/\/boinc.bakerlab.org\/rosetta\/.  Rosetta@Home. http:\/\/boinc.bakerlab.org\/rosetta\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050015"},{"key":"e_1_3_2_1_46_1","volume-title":"WITSP \u00bf05","author":"Thommes R.","year":"2005","unstructured":"R. Thommes and M. Coates . Bittorrent fairness: analysis and improvements . In WITSP \u00bf05 , December 2005 . R. Thommes and M. Coates. Bittorrent fairness: analysis and improvements. In WITSP \u00bf05, December 2005."},{"key":"e_1_3_2_1_47_1","first-page":"2","volume-title":"Karma: A secure economic framework for","author":"Vishnumurthy V.","year":"2003","unstructured":"V. Vishnumurthy , S. Chandrakumar , and E. G. Sirer . Karma: A secure economic framework for p 2 p resource sharing. In P 2PECON \u00bf03, 2003 . V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer. Karma: A secure economic framework for p2p resource sharing. In P2PECON \u00bf03, 2003."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. 3rd USENIX\/ACM NSDI","author":"Walfish M.","year":"2006","unstructured":"M. Walfish , J. Zamfirescu , H. Balakrishnan , D. Karger , and S. Shenker . Distributed quota enforcement for spam control . In Proc. 3rd USENIX\/ACM NSDI , May 2006 . M. Walfish, J. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker. Distributed quota enforcement for spam control. In Proc. 3rd USENIX\/ACM NSDI, May 2006."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687811"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.010827"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":50,"alternative-id":["10.1145\/1314333.1314339","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314339","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}