{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:20:59Z","timestamp":1760059259799,"version":"build-2065373602"},"reference-count":68,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Commission","award":["101060876"],"award-info":[{"award-number":["101060876"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Decentralized P2P networks have emerged as robust instruments to execute computing tasks, with enhanced security and transparency. Solutions such as Blockchain have proved to be successful in a large catalog of critical applications such as cryptocurrency, intellectual property, etc. However, although executions are transparent and P2P are resistant against common cyberattacks, they tend to be untrustworthy. P2P nodes typically do not offer any evidence about the quality of their resolution of the delegated computing tasks, so trustworthiness of results is threatened. To mitigate this challenge, in usual P2P networks, many different replicas of the same computing task are delegated to different nodes. The final result is the one most nodes reached. But this approach is very resource consuming, especially in terms of energy, as many unnecessary computing tasks are executed. Therefore, new solutions to achieve trustworthy P2P networks, but with an energy efficiency perspective, are needed. This study addresses this challenge. The purpose of the research is to evaluate the effectiveness of an audit-based and score-based approach is assigned to each node instead of performing identical tasks redundantly on different nodes in the network. The proposed solution employs probabilistic methods to detect the malicious nodes taking into account parameters like number of executed tasks and number of audited ones giving a value to the node, and game theory which consider that all nodes play with the same rules. Qualitative and quantitative experimental methods are used to evaluate its impact. The results reveal a significant reduction in network energy consumption, minimum a 50% comparing to networks in which each task is delivered to different nodes considering the task is delivered to a pair of nodes, supporting the effectiveness of the proposed approach.<\/jats:p>","DOI":"10.3390\/computers14060216","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T05:09:12Z","timestamp":1748840952000},"page":"216","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Trustworthy Energy Efficient P2P Networks: A New Method for Validating Computing Results in Decentralized Networks"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7044-5190","authenticated-orcid":false,"given":"Fernando","family":"Rodr\u00edguez-Sela","sequence":"first","affiliation":[{"name":"IT Department, Universidad Polit\u00e9cnica de Madrid, 28031 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7815-5924","authenticated-orcid":false,"given":"Borja","family":"Bordel","sequence":"additional","affiliation":[{"name":"IT Department, Universidad Polit\u00e9cnica de Madrid, 28031 Madrid, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bordel S\u00e1nchez, B., Alcarria Garrido, R.P., Robles Valladares, T.E., de la Torre, G., and Carretero, I. (2021, January 23\u201326). Digital User-Industry Interactions and Industry 4.0 Services to Improve Customers\u2019 Experience and Satisfaction in the European Bakery Sector. Proceedings of the 2021 16th Iberian Conference on Information Systems and Technologies (CISTI), Lisboa, Portugal.","DOI":"10.23919\/CISTI52073.2021.9476568"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"22623","DOI":"10.1073\/pnas.2015968117","article-title":"Nascent Exascale Supercomputers Offer Promise, Present Challenges","volume":"117","author":"Mann","year":"2020","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1007\/s12083-020-00898-2","article-title":"A Trust-Based Minimum Cost and Quality Aware Data Collection Scheme in P2P Network","volume":"13","author":"Ren","year":"2020","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1007\/s12083-021-01259-3","article-title":"An Optimal Load Balancing Strategy for P2P Network Using Chicken Swarm Optimization","volume":"15","author":"Kumar","year":"2022","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Aysan, A.F., Demirta\u015f, H.B., and Sara\u00e7, M. (2021). The Ascent of Bitcoin: Bibliometric Analysis of Bitcoin Research. J. Risk Financ. Manag., 14.","DOI":"10.20944\/preprints202108.0555.v1"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"122105","DOI":"10.1016\/j.techfore.2022.122105","article-title":"IP dLedger\u2014Decentralized Ledger for Intellectual Property Administration","volume":"186","author":"Nam","year":"2023","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alcarria, R., Bordel, B., Robles, T., Mart\u00edn, D., and Manso-Callejo, M.\u00c1. (2018). A Blockchain-Based Authorization System for Trustworthy Resource Monitoring and Trading in Smart Communities. Sensors, 18.","DOI":"10.3390\/s18103561"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Robles, T., Bordel, B., Alcarria, R., and S\u00e1nchez-de-Rivera, D. (2018, January 4\u20137). Blockchain Technologies for Private Data Management in AmI Environments. Proceedings of the UCAmI, Punta Cana, Dominican Republic.","DOI":"10.3390\/proceedings2191230"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alhussain, A., Kurdi, H., and Altoaimy, L. (2021). Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks. Sensors, 21.","DOI":"10.3390\/s21134484"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.future.2020.11.013","article-title":"Denial of Chain: Evaluation and Prediction of a Novel Cyberattack in Blockchain-supported Systems","volume":"116","author":"Bordel","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10723-019-09497-9","article-title":"BOINC: A Platform for Volunteer Computing","volume":"18","author":"Anderson","year":"2020","journal-title":"J. Grid Comput."},{"key":"ref_12","unstructured":"Taufer, M., Anderson, D., Cicotti, P., and Brooks, C. (2005, January 4\u20138). Homogeneous Redundancy: A Technique to Ensure Integrity of Molecular Simulation Results Using Public Computing. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, Washington, DC, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Niwa, K., Harada, N., Zhang, G., and Kleijn, W.B. (2020, January 6\u201310). Edge-Consensus Learning: Deep Learning on P2P Networks with Nonhomogeneous Data. Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, New York, NY, USA. KDD \u201920.","DOI":"10.1145\/3394486.3403109"},{"key":"ref_14","unstructured":"Foster, I., and Kesselman, C. (2003). The Grid 2: Blueprint for a New Computing Infrastructure, Elsevier."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., and Shu, L. (2014). Virtual Machine Isolation. Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, Springer.","DOI":"10.1007\/978-3-642-54525-2"},{"key":"ref_16","unstructured":"Reuben, J.S. (2007). A Survey on Virtual Machine Security, Helsinki University of Thechnology. Available online: https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&type=pdf&doi=c17ca55a1b269dc162f8e14ce3980c0e8f9b15e8."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Liu, L., Pu, C., Dou, Q., Wu, L., and Zhou, W. (2018). A Comparative Study of Containers and Virtual Machines in Big Data Environment. arXiv.","DOI":"10.1109\/CLOUD.2018.00030"},{"key":"ref_18","unstructured":"Lucia, M.J.D. (2025, May 27). A Survey on Security Isolation of Virtualization, Containers, and Unikernels 1 May 2017. Available online: https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1035194.pdf."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.procs.2020.07.025","article-title":"A Review of Native Container Security for Running Applications","volume":"175","author":"Flauzac","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_20","unstructured":"(2022, October 03). JSAPI Reference. Available online: http:\/\/udn.realityripple.com\/docs\/Mozilla\/Projects\/SpiderMonkey\/JSAPI_reference."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1007\/s11747-022-00845-y","article-title":"Digital Technologies: Tensions in Privacy and Data","volume":"50","author":"Quach","year":"2022","journal-title":"J. Acad. Mark. Sci."},{"key":"ref_22","first-page":"247","article-title":"Privacy Concerns in the Smart Home Context","volume":"2","author":"Guhr","year":"2020","journal-title":"Appl. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kim, D., Kwon, B.J., and Dumitra\u015f, T. (November, January 30). Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3133958"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Nightingale, E.B., Douceur, J.R., and Orgovan, V. (2011, January 10\u201313). Cycles, Cells and Platters: An Empirical Analysisof Hardware Failures on a Million Consumer PCs. Proceedings of the Sixth Conference on Computer Systems, Salzburg, Austria.","DOI":"10.1145\/1966445.1966477"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s10723-009-9126-3","article-title":"Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC","volume":"7","author":"Estrada","year":"2009","journal-title":"J. Grid Comput."},{"key":"ref_26","unstructured":"Costan, V. (2016). Intel SGX Explained. IACR Cryptol, EPrint Arch, Massachusetts Institute of Technology. Available online: https:\/\/people.cs.rutgers.edu\/~santosh.nagarakatte\/cs544\/readings\/costan-sgx.pdf."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zheng, W., Wu, Y., Wu, X., Feng, C., Sui, Y., Luo, X., and Zhou, Y. (2020). A Survey of Intel SGX and Its Applications. Front. Comput. Sci., 15.","DOI":"10.1007\/s11704-019-9096-y"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhao, C., Saifuding, D., Tian, H., Zhang, Y., and Xing, C. (2016, January 23\u201325). On the Performance of Intel SGX. Proceedings of the 2016 13th Web Information Systems and Applications Conference (WISA), Wuhan, China.","DOI":"10.1109\/WISA.2016.45"},{"key":"ref_29","unstructured":"Liu, Z., Luong, N.C., Wang, W., Niyato, D., Wang, P., Liang, Y.C., and Kim, D.I. (2019). A Survey on Applications of Game Theory in Blockchain. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Vigna, G. (2007). Static Disassembly and Code Analysis. Malware Detection, Springer.","DOI":"10.1007\/978-0-387-44599-1_2"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Pierson, J.M. (2015). Energy Efficiency in P2P Systems and Applications. Large-Scale Distributed Systems and Energy Efficiency, John Wiley & Sons, Inc.","DOI":"10.1002\/9781118981122"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.jpdc.2021.06.009","article-title":"Energy Saving Strategy and Nash Equilibrium of Hybrid P2P Networks","volume":"157","author":"Ma","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Xie, M., Zhu, T., Xu, W., Yi, P., Huang, Z., Zhang, Q., and Xiao, S. (2014, January 3\u20135). EEP2P: An Energy-Efficient and Economy-Efficient P2P Network Protocol. Proceedings of the International Green Computing Conference, Dallas, TX, USA.","DOI":"10.1109\/IGCC.2014.7039171"},{"key":"ref_34","first-page":"100603","article-title":"Investigating the Impact on Execution Time and Energy Consumption of Developing with Spring","volume":"32","author":"Calero","year":"2021","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Pereira, R., Couto, M., Ribeiro, F., Rua, R., Cunha, J., Fernandes, J.P., and Saraiva, J. (2017, January 23\u201324). Energy Efficiency across Programming Languages: How Do Energy, Time, and Memory Relate?. Proceedings of the 10th ACM SIGPLAN International Conference on Software Language Engineering, New York, NY, USA. SLE 2017.","DOI":"10.1145\/3136014.3136031"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2425248.2425252","article-title":"Measuring Energy Consumption for Short Code Paths Using RAPL","volume":"40","year":"2012","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1073\/pnas.36.1.48","article-title":"Equilibrium Points in n-Person Games","volume":"36","author":"Nash","year":"1950","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kim, J.H., Shin, D.U., and Kim, H. (2024). Data Center Energy Evaluation Tool Development and Analysis of Power Usage Effectiveness with Different Economizer Types in Various Climate Zones. Buildings, 14.","DOI":"10.3390\/buildings14010299"},{"key":"ref_39","unstructured":"IEA3 (2024, September 13). International Energy Agency. Available online: https:\/\/www.iea.org\/energy-system\/buildings\/data-centres-and-data-transmission-networks."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Jourjon, G., Rakotoarivelo, T., and Ott, M. (2010, January 17\u201319). Models for an Energy-Efficient P2P Delivery Service. Proceedings of the 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, Pisa, Italy.","DOI":"10.1109\/PDP.2010.69"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.eswa.2006.01.017","article-title":"Enhancing Peer-to-Peer Collaboration Using Trust","volume":"31","author":"Griffiths","year":"2006","journal-title":"Expert Syst. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Wadhwa, S., Rani, S., Verma, S., Shafi, J., and Wozniak, M. (2022). Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing. Sensors, 22.","DOI":"10.3390\/s22103733"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"109118","DOI":"10.1016\/j.comnet.2022.109118","article-title":"Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm","volume":"214","author":"Lasla","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"8277","DOI":"10.1016\/j.egyr.2021.07.136","article-title":"Energy-Efficient Blockchain Implementation for Cognitive Wireless Communication Networks (CWCNs)","volume":"7","author":"Chithaluru","year":"2021","journal-title":"Energy Rep."},{"key":"ref_45","first-page":"1","article-title":"A Comprehensive Review of Decentralization Technologies in Bitcoin, Ethereum, and Solana","volume":"7","author":"Ivanov","year":"2024","journal-title":"Adv. Comput. Sci."},{"key":"ref_46","unstructured":"(2022, September 09). Ethereum Whitepaper. Available online: https:\/\/ethereum.org."},{"key":"ref_47","unstructured":"Dameron, M. (2025, May 27). Beigepaper: An Ethereum Technical Specification. Available online: https:\/\/github.com\/chronaeon\/beigepaper\/blob\/master\/beigepaper.pdf."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"e5228","DOI":"10.1002\/cpe.5228","article-title":"Analyzing Smart Contract Interactions and Contract Level State Consensus","volume":"32","author":"Hu","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1080\/15427951.2015.1051674","article-title":"The Analysis of Kademlia for Random IDs","volume":"11","author":"Cai","year":"2015","journal-title":"Internet Math."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Druschel, P., Kaashoek, F., and Rowstron, A. (2002). Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. Proceedings of the Peer-to-Peer Systems, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/3-540-45748-8"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Liu, H., Luo, X., Liu, H., and Xia, X. (2021, January 23\u201326). Merkle Tree: A Fundamental Component of Blockchains. Proceedings of the 2021 International Conference on Electronic Information Engineering and Computer Science (EIECS), Changchun, China.","DOI":"10.1109\/EIECS53707.2021.9588047"},{"key":"ref_52","unstructured":"Anderson, D. (2004, January 8). BOINC: A System for Public-Resource Computing and Storage. Proceedings of the Fifth IEEE\/ACM International Workshop on Grid Computing, Pittsburgh, PA, USA."},{"key":"ref_53","unstructured":"Cohen, B. (2025, May 27). Incentives Build Robustness in BitTorrent. Available online: https:\/\/stuker.com\/wp-content\/uploads\/import\/i-1fd3ae7c5502dfddfe8b2c7acdefaa5e-bittorrentecon.pdf."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Trautwein, D., Raman, A., Tyson, G., Castro, I., Scott, W., Schubotz, M., Gipp, B., and Psaras, Y. (2022, January 22\u201326). Design and Evaluation of IPFS: A Storage Layer for the Decentralized Web. Proceedings of the ACM SIGCOMM 2022 Conference, New York, NY, USA. SIGCOMM \u201922.","DOI":"10.1145\/3544216.3544232"},{"key":"ref_55","unstructured":"Tr\u00f3n, V. The Book of Swarm, Available online: https:\/\/papers.ethswarm.org\/p\/book-of-swarm\/."},{"key":"ref_56","unstructured":"Luo, X., Shen, J., Gu, J., Lyu, M.R., and Zhou, Y. (2023). SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory, USENIX. Available online: https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/luo."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Yan, Y., Tu, T., Zhao, L., Zhou, Y., and Wang, W. (2021, January 2\u20134). Understanding the Performance of Webassembly Applications. Proceedings of the 21st ACM Internet Measurement Conference, New York, NY, USA. IMC \u201921.","DOI":"10.1145\/3487552.3487827"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Haas, A., Rossberg, A., Schuff, D.L., Titzer, B.L., Holman, M., Gohman, D., Wagner, L., Zakai, A., and Bastien, J.F. (2017, January 18\u201323). Bringing the Web up to Speed with WebAssembly. Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, Barcelona, Spain.","DOI":"10.1145\/3062341.3062363"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Shi, Y., Gregg, D., Beatty, A., and Ertl, M.A. (2008). Virtual Machine Showdown: Stack Versus Registers, Association for Computing Machinery.","DOI":"10.1145\/1328195.1328197"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"van Hasselt, M., Huijzendveld, K., Noort, N., de Ruijter, S., Islam, T., and Malavolta, I. (2022, January 13\u201315). Comparing the Energy Efficiency of WebAssembly and JavaScript in Web Applications on Android Mobile Devices. Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering, New York, NY, USA. EASE \u201922.","DOI":"10.1145\/3530019.3530034"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-662-43652-3_19","article-title":"WebASM: An Abstract State Machine Execution Environment for the Web","volume":"Volume 8477","author":"Hutchison","year":"2014","journal-title":"Abstract State Machines, Alloy, B, TLA, VDM, and Z"},{"key":"ref_62","unstructured":"Jangda, A., Powers, B., Guha, A., and Berger, E. (2019). Mind the Gap: Analyzing the Performance of Webassembly vs. Native Code. arXiv."},{"key":"ref_63","unstructured":"Mozilla (2024). Github: Servo\/Mozjs, Github."},{"key":"ref_64","unstructured":"(2024, March 26). V8 JavaScript Engine. Available online: https:\/\/v8.dev\/."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Lehmann, D., and Pradel, M. (2019, January 13\u201317). Wasabi: A Framework for Dynamically Analyzing Webassembly. Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, Providence, RI, USA.","DOI":"10.1145\/3297858.3304068"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Watt, C. (2018, January 8\u20139). Mechanising and Verifying the WebAssembly Specification. Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, Los Angeles, CA, USA.","DOI":"10.1145\/3167082"},{"key":"ref_67","unstructured":"(2024, March 26). Spidermonkey-Embedding-Examples\/Docs\/JSAPI Introduction.Md at Esr115\u00b7Mozilla-Spidermonkey\/Spidermonkey-Embedding-Examples. Available online: https:\/\/github.com\/mozilla-spidermonkey\/spidermonkey-embedding-examples\/blob\/esr115\/docs\/JSAPI%20Introduction.md."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., and Balakrishnan, H. (2001, January 27\u201331). Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. Proceedings of the SIGCOMM\u201901, San Diego, CA, USA.","DOI":"10.1145\/964723.383071"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/6\/216\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:46:01Z","timestamp":1760031961000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/6\/216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":68,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["computers14060216"],"URL":"https:\/\/doi.org\/10.3390\/computers14060216","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2025,6,2]]}}}