{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:58:20Z","timestamp":1729616300231,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/aina.2009.87","type":"proceedings-article","created":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T22:24:14Z","timestamp":1246227854000},"page":"608-615","source":"Crossref","is-referenced-by-count":0,"title":["Exclusion of Forged Files from Multi-source Downloadable P2P Systems"],"prefix":"10.1109","author":[{"given":"Yuna","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Junghei","family":"You","sequence":"additional","affiliation":[]},{"given":"Heejae","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"journal-title":"Advanced Intelligent Corruption Handling (AICH)","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"kademlia: a peer-to-peer information system based on the xor metric","volume":"2429","author":"maymounkov","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Gnutella","year":"0","key":"3"},{"journal-title":"BitTorrent","year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76993-4_37"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.025"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265474"},{"key":"5","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/586110.586138","article-title":"reputation-based approach for choosing reliable resources in peer-to-peer networks","author":"damiani","year":"2002","journal-title":"9th ACM Conference on Computer and Communications Security (CCS'02)"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-76993-4_6","article-title":"a new reputation-based trust management mechanism against false feedbacks in peerto-peer systems","volume":"4831","author":"jin","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"}],"event":{"name":"2009 International Conference on Advanced Information Networking and Applications","start":{"date-parts":[[2009,5,26]]},"location":"Bradford, United Kingdom","end":{"date-parts":[[2009,5,29]]}},"container-title":["2009 International Conference on Advanced Information Networking and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076161\/5076162\/05076255.pdf?arnumber=5076255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:23:38Z","timestamp":1497806618000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5076255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/aina.2009.87","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}