{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:16:45Z","timestamp":1763749005912,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.23919\/ifipnetworking57963.2023.10186387","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T13:38:31Z","timestamp":1690205911000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Enhanced Content Discovery for Bitswap"],"prefix":"10.23919","author":[{"given":"Erik","family":"Daniel","sequence":"first","affiliation":[{"name":"Technische Universit&#x00E4;t Berlin,Distributed Security Infrastructures"}]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t Berlin,Distributed Security Infrastructures"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3311888"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/COMST.2017.2749508"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.comnet.2018.11.012"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2500098.2500102"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1281700.1281708"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.17487\/RFC7945"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3460120.3484778"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MCOM.2012.6231276"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1658939.1658941"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2491224.2491237"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1002\/sec.910"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ACCESS.2018.2851611"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TDSC.2016.2550437"},{"year":"0","journal-title":"Github - ipfs\/go-bitswap The golang implementation of the bitswap protocol","key":"ref24"},{"year":"0","journal-title":"Github &#x2013; openmined\/psi Private set intersection cardinality protocol based on ecdh and bloom filters","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICDCSW56584.2022.00020"},{"key":"ref25","first-page":"11","author":"de la rocha","year":"2021","journal-title":"Accelerating content routing with bitswap A multi-path file transfer protocol in ipfs and filecoin"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICDCS54860.2022.00069"},{"key":"ref22","first-page":"1447","article-title":"Mobile private contact discovery at scale","author":"kales","year":"2019","journal-title":"USENIX Security '19 Proceedings of the 28th USENIX Security Symposium"},{"key":"ref21","first-page":"797","article-title":"Faster private set intersection based on OT extension","author":"pinkas","year":"2014","journal-title":"USENIX Security '14 Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref28","first-page":"1","author":"perrin","year":"2018","journal-title":"The noise protocol framework revision 34"},{"year":"2019","author":"faz-hern\u00e1ndez","journal-title":"Introducing CIRCL An Advanced Cryptographic Library","key":"ref27"},{"year":"0","journal-title":"Github &#x2013; libp2p\/go-libp2p Libp2p implementation in go","key":"ref29"},{"key":"ref8","article-title":"Epi-one: Lightweight contact tracing with strong privacy","author":"trieu","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref7","volume":"abs 2011 9350","author":"angelou","year":"2020","journal-title":"Asymmetric private set intersection with applications to contact tracing and private vertical federated machine learning"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1515\/popets-2017-0044"},{"key":"ref4","volume":"abs 1407 3561","author":"benet","year":"2014","journal-title":"IPFS - Content Addressed Versioned P2P File System"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2022.3143147"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/362686.362692"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3154794"}],"event":{"name":"2023 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2023,6,12]]},"location":"Barcelona, Spain","end":{"date-parts":[[2023,6,15]]}},"container-title":["2023 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10186376\/10186354\/10186387.pdf?arnumber=10186387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:34:57Z","timestamp":1692020097000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10186387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking57963.2023.10186387","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]}}}