{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:49Z","timestamp":1750309369579,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"name":"S\u00e4chsisches Staatsministerium f\u00fcr Wissenschaft, Kultur und Tourismus"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707703","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:30:17Z","timestamp":1747247417000},"page":"1345-1352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Kademlia Lookup Privacy through Query Obfuscation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9054-3396","authenticated-orcid":false,"given":"Erik","family":"Daniel","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2114-0198","authenticated-orcid":false,"given":"Guillaume","family":"Michel","sequence":"additional","affiliation":[{"name":"Interplanetary Shipyard, Zug, Zug, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6716-7225","authenticated-orcid":false,"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Saxony, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Michael A Hoeh, Daniel Liu, Pavlos Papadopoulos, Robin Roehm, Robert Sandmann, et al.","author":"Angelou Nick","year":"2020","unstructured":"Nick Angelou, Ayoub Benaissa, Bogdan Cebere, William Clark, Adam James Hall, Michael A Hoeh, Daniel Liu, Pavlos Papadopoulos, Robin Roehm, Robert Sandmann, et al. 2020. Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning. arXiv preprint arXiv:2011.09350 (2020). https:\/\/arxiv.org\/pdf\/2011.09350.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414473"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"e_1_3_2_1_4_1","volume-title":"Versioned, P2P File System. arxiv abs\/1407.3561","author":"Benet Juan","year":"2014","unstructured":"Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. arxiv abs\/1407.3561 (2014). http:\/\/arxiv.org\/abs\/1407.3561"},{"volume-title":"P2PEcon '03: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems. 68\u201372.","author":"Cohen Bram","key":"e_1_3_2_1_5_1","unstructured":"Bram Cohen. 2003. Incentives build robustness in BitTorrent. In P2PEcon '03: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems. 68\u201372."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"e_1_3_2_1_7_1","volume-title":"Accelerating content routing with bitswap: A multi-path file transfer protocol in ipfs and filecoin","author":"la Rocha Alfonso De","year":"2021","unstructured":"Alfonso De la Rocha, David Dias, and Yiannis Psaras. 2021. Accelerating content routing with bitswap: A multi-path file transfer protocol in ipfs and filecoin. San Francisco, CA, USA (2021), 11."},{"volume-title":"Tor: The Second-Generation Onion Router. In USENIX Security '04: Proceedings of the 13th USENIX Security Symposium. 303\u2013320","author":"Dingledine Roger","key":"e_1_3_2_1_8_1","unstructured":"Roger Dingledine, Nick Mathewson, and Paul F. Syverson. 2004. Tor: The Second-Generation Onion Router. In USENIX Security '04: Proceedings of the 13th USENIX Security Symposium. 303\u2013320."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Thomas Katsantas Yannis Thomas Christos Karapapas and George Xylomenos. 2024. Enhancing IPFS privacy through triple hashing. (2024) 1\u20136.","DOI":"10.1109\/ISCC61673.2024.10733729"},{"key":"e_1_3_2_1_10_1","volume-title":"Decentralised Internet.","author":"Lambert Nick","year":"2014","unstructured":"Nick Lambert and Benjamin Bollen. 2014. The SAFE Network a New, Decentralised Internet. (2014)."},{"key":"e_1_3_2_1_11_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems. 53\u201365","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazi\u00e8res. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems. 53\u201365."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485612"},{"key":"e_1_3_2_1_13_1","volume-title":"Peer2PIR: Private Queries for IPFS. arXiv arXiv:2405.17307","author":"Mazmudar Miti","year":"2024","unstructured":"Miti Mazmudar, Shannon Veitch, and Rasoul Akhavan Mahdavi. 2024. Peer2PIR: Private Queries for IPFS. arXiv arXiv:2405.17307 (2024)."},{"key":"e_1_3_2_1_14_1","volume-title":"Scalable Onion Routing with Torsk. In CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. 590\u2013599","author":"McLachlan Jon","year":"2009","unstructured":"Jon McLachlan, Andrew Tran, Nicholas Hopper, and Yongdae Kim. 2009. Scalable Onion Routing with Torsk. In CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. 590\u2013599."},{"key":"e_1_3_2_1_15_1","volume-title":"NISAN: Network Information Service for Anonymization Networks. In CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. 141\u2013150","author":"Panchenko Andriy","year":"2009","unstructured":"Andriy Panchenko, Stefan Richter, and Arne Rache. 2009. NISAN: Network Information Service for Anonymization Networks. In CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. 141\u2013150."},{"key":"e_1_3_2_1_16_1","volume-title":"Faster Private Set Intersection Based on OT Extension. In USENIX Security '14: Proceedings of the 23rd USENIX Security Symposium. 797\u2013812","author":"Pinkas Benny","year":"2014","unstructured":"Benny Pinkas, Thomas Schneider, and Michael Zohner. 2014. Faster Private Set Intersection Based on OT Extension. In USENIX Security '14: Proceedings of the 23rd USENIX Security Symposium. 797\u2013812."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_18_1","unstructured":"Viktor Tr\u00f3n. 2023. The Book of Swarm. online. https:\/\/www.ethswarm.org\/The-Book-of-Swarm.pdf v2.0 pre-release 1.3."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.78"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866343"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707703","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:14Z","timestamp":1750291574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":20,"alternative-id":["10.1145\/3672608.3707703","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707703","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}