{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:34Z","timestamp":1750307554377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T00:00:00Z","timestamp":1260748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FEDER","award":["TSI2007-65406-C03-03 E-AEGISCONSOLIDER CSD2007-00004 ARES"],"award-info":[{"award-number":["TSI2007-65406-C03-03 E-AEGISCONSOLIDER CSD2007-00004 ARES"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12,14]]},"DOI":"10.1145\/1806338.1806373","type":"proceedings-article","created":{"date-parts":[[2010,5,25]],"date-time":"2010-05-25T13:08:24Z","timestamp":1274792904000},"page":"160-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing a Java P2P framework"],"prefix":"10.1145","author":[{"given":"Joan","family":"Arnedo-Moreno","sequence":"first","affiliation":[{"name":"Universitat Oberta de Catalunya (UOC), Barcelona, Spain"}]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[{"name":"Fukuoka Institute of Technology (FIT), Higashi-Ku, Fukuoka, Japan"}]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[{"name":"Fukuoka Institute of Technology (FIT), Higashi-Ku, Fukuoka, Japan"}]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[{"name":"Technical University of Catalonia (UPC), Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2009,12,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jxta 2.5 rc1 June 2007. http:\/\/download.java.net\/jxta\/build.  Jxta 2.5 rc1 June 2007. http:\/\/download.java.net\/jxta\/build."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2008.7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.04.037"},{"key":"e_1_3_2_1_4_1","volume-title":"July","author":"Bailly D.","year":"2002","unstructured":"D. Bailly . Cbjx: Crypto-based jxta (an internship report) , July 2002 . D. Bailly. Cbjx: Crypto-based jxta (an internship report), July 2002."},{"key":"e_1_3_2_1_5_1","volume-title":"The directory authentication framework. recommendation","author":"CCITT.","year":"1988","unstructured":"CCITT. The directory authentication framework. recommendation , 1988 . CCITT. The directory authentication framework. recommendation, 1988."},{"key":"e_1_3_2_1_6_1","volume-title":"1st Workshop on the Economics of Peer-2-Peer Systems","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives build robustness in bittorrent . 1st Workshop on the Economics of Peer-2-Peer Systems , 2003 . B. Cohen. Incentives build robustness in bittorrent. 1st Workshop on the Economics of Peer-2-Peer Systems, 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Wireshark","author":"G.","year":"1998","unstructured":"G. C. et al . Wireshark , 1998 . http:\/\/www.wireshark.org\/. G. C. et al. Wireshark, 1998. http:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/17440080810901115"},{"key":"e_1_3_2_1_9_1","volume-title":"Ietf rfc 3548 - the base16, base32, and base64 data encodings","author":"Josefsson E. S.","year":"2003","unstructured":"E. S. Josefsson . Ietf rfc 3548 - the base16, base32, and base64 data encodings , 2003 . http:\/\/www.ietf.org\/rfc\/rfc3548.txt. E. S. Josefsson. Ietf rfc 3548 - the base16, base32, and base64 data encodings, 2003. http:\/\/www.ietf.org\/rfc\/rfc3548.txt."},{"key":"e_1_3_2_1_10_1","volume-title":"Dns spoofing (malicious cache poisoning)","author":"Sax D.","year":"2003","unstructured":"D. Sax . Dns spoofing (malicious cache poisoning) , 2003 . http:\/\/www.sans.org\/rr\/firewall\/DNS_spoof.php. D. Sax. Dns spoofing (malicious cache poisoning), 2003. http:\/\/www.sans.org\/rr\/firewall\/DNS_spoof.php."},{"key":"e_1_3_2_1_11_1","volume-title":"Ppp challenge handshake authentication protocol (chap)","author":"Simpson W.","year":"1996","unstructured":"W. Simpson . Ppp challenge handshake authentication protocol (chap) , 1996 . http:\/\/tools.ietf.org\/html\/rfc1994. W. Simpson. Ppp challenge handshake authentication protocol (chap), 1996. http:\/\/tools.ietf.org\/html\/rfc1994."},{"key":"e_1_3_2_1_12_1","volume-title":"Jxta v2.0 protocols specification","author":"SUN Microsystems Inc.","year":"2007","unstructured":"SUN Microsystems Inc. Jxta v2.0 protocols specification , 2007 . https:\/\/jxta-spec.dev.java. net\/nonav\/JXTAProtocols.html. SUN Microsystems Inc. Jxta v2.0 protocols specification, 2007. https:\/\/jxta-spec.dev.java. net\/nonav\/JXTAProtocols.html."},{"key":"e_1_3_2_1_13_1","volume-title":"Java cryptography architecture (jca)","author":"SUN Microsystems Inc.","year":"2008","unstructured":"SUN Microsystems Inc. Java cryptography architecture (jca) , 2008 . http:\/\/java.sun.com\/javase\/6\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html. SUN Microsystems Inc. Java cryptography architecture (jca), 2008. http:\/\/java.sun.com\/javase\/6\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html."},{"key":"e_1_3_2_1_14_1","volume-title":"Ietf rfc 2246: The tls protocol version 1.0","author":"Dierks C. A. T.","year":"1999","unstructured":"C. A. T. Dierks . Ietf rfc 2246: The tls protocol version 1.0 , 1999 . http:\/\/www.ietf.org\/rfc\/rfc2246.txt. C. A. T. Dierks. Ietf rfc 2246: The tls protocol version 1.0, 1999. http:\/\/www.ietf.org\/rfc\/rfc2246.txt."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776510.1776554"}],"event":{"name":"iiWAS '09: 11th International Conference on Information Integration and Web-based Applications & Services","sponsor":["Johannes Kepler University","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Kuala Lumpur Malaysia","acronym":"iiWAS '09"},"container-title":["Proceedings of the 11th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806338.1806373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1806338.1806373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:43Z","timestamp":1750249423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806338.1806373"}},"subtitle":["the JXTA-overlay case"],"short-title":[],"issued":{"date-parts":[[2009,12,14]]},"references-count":15,"alternative-id":["10.1145\/1806338.1806373","10.1145\/1806338"],"URL":"https:\/\/doi.org\/10.1145\/1806338.1806373","relation":{},"subject":[],"published":{"date-parts":[[2009,12,14]]},"assertion":[{"value":"2009-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}