{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:56:54Z","timestamp":1725451014703},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/icccn.2008.ecp.67","type":"proceedings-article","created":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T14:46:30Z","timestamp":1228142790000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Sources and Monitors: A Trust Model for Peer-to-Peer Networks"],"prefix":"10.1109","author":[{"family":"Yan Li","sequence":"first","affiliation":[]},{"given":"M.G.","family":"Gouda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"experience with an object reputation system for peer-to-peer filesharing","author":"walsh","year":"2006","journal-title":"NSDI'06"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060808"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064218"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"11","article-title":"pollution in p2p file sharing systems","author":"liang","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064017"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/945472.945475"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76627-8_24"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/511495.511496"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_15"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"journal-title":"Sources and monitors A trust model for peer-to-peer networks","year":"2007","author":"li","key":"8"}],"event":{"name":"17th International Conference on Computer Communications and Networks 2008","start":{"date-parts":[[2008,8,3]]},"location":"St. Thomas, US Virgin Islands","end":{"date-parts":[[2008,8,7]]}},"container-title":["2008 Proceedings of 17th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4674159\/4674160\/04674227.pdf?arnumber=4674227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:27:05Z","timestamp":1489681625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4674227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icccn.2008.ecp.67","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}