{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:39Z","timestamp":1750221279145,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Electronics and Information Technology, Government of India","award":["12(7)\/2015-ESD"],"award-info":[{"award-number":["12(7)\/2015-ESD"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,13]]},"DOI":"10.1145\/3136825.3136865","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"319-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CAP"],"prefix":"10.1145","author":[{"given":"Srikanta","family":"Pradhan","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Patna, Patna, India"}]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Patna, Patna, India"}]}],"member":"320","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831163"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654819"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876400"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.02.003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997509"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-013-0216-4"},{"key":"e_1_3_2_1_9_1","unstructured":"Hosam Rowaihy William Enck Patrick Mcdaniel and Thomas La Porta. 2005. Limiting sybil attacks in structured peer-to-peer networks. Technical report Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University USA (2005).  Hosam Rowaihy William Enck Patrick Mcdaniel and Thomas La Porta. 2005. Limiting sybil attacks in structured peer-to-peer networks. Technical report Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University USA (2005)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"volume-title":"SCRIBE: The design of a large-scale event notification infrastructure. Networked group communication 2233","year":"2001","author":"Rowstron Antony","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Mebratu Tsehayu. 2015. Secure Routing in Structured P2P Overlay. Master's thesis. Mid Sweden University Sundsvall Sweden.  Mebratu Tsehayu. 2015. Secure Routing in Structured P2P Overlay. Master's thesis. Mid Sweden University Sundsvall Sweden."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883615"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Wei Wang and Wenhong Zhao 2015. Model the P2P Attack in Computer Networks. (2015).  Wei Wang and Wenhong Zhao 2015. Model the P2P Attack in Computer Networks. (2015).","DOI":"10.2991\/lemcs-15.2015.260"}],"event":{"name":"SIN '17: Security of Information and Networks","acronym":"SIN '17","location":"Jaipur India"},"container-title":["Proceedings of the 10th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136825.3136865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:17Z","timestamp":1750212677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136865"}},"subtitle":["collaborative attack on pastry"],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":14,"alternative-id":["10.1145\/3136825.3136865","10.1145\/3136825"],"URL":"https:\/\/doi.org\/10.1145\/3136825.3136865","relation":{},"subject":[],"published":{"date-parts":[[2017,10,13]]},"assertion":[{"value":"2017-10-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}