{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:34:53Z","timestamp":1730234093774,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icccn.2011.6006030","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:33:30Z","timestamp":1315856010000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Making P2P Downloading Dependable by Exploiting Social Networks"],"prefix":"10.1109","author":[{"given":"Yingwu","family":"Zhu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"journal-title":"Proceedings of the 6th USENIX NSDI 2009","article-title":"Sybil-resilient online content voting","year":"0","author":"tran","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"journal-title":"Overpeer","year":"2008","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064017"},{"key":"1","first-page":"1174","article-title":"Pollution in p2p file sharing systems","volume":"2","author":"liang","year":"2005","journal-title":"Proceedings of IEEE Infocom"},{"journal-title":"Proceedings of USENIX NSDI April 2008","article-title":"Ostra: Leveraging trust to thwart unwanted communication","year":"0","author":"mislove","key":"10"},{"journal-title":"Sig2dat Tool for Fasttrack Network","year":"2008","key":"7"},{"key":"6","first-page":"1","article-title":"Experience with an object reputation system for peer-to-peer filesharing","author":"walsh","year":"2006","journal-title":"Proceedings of NSDI"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064218"},{"journal-title":"Proceedings of IPTPS Feb 2006","article-title":"Understanding pollution dynamics in p2p file sharing","year":"0","author":"lee","key":"4"},{"journal-title":"Proceedings of the IEEE Symposium on Security and Privacy","article-title":"Sybillimit: A nearoptimal social network defense against sybil attacks","year":"2008","author":"yu","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923723"}],"event":{"name":"2011 20th International Conference on Computer Communications and Networks - ICCCN 2011","start":{"date-parts":[[2011,7,31]]},"location":"Lahaina, HI, USA","end":{"date-parts":[[2011,8,4]]}},"container-title":["2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005186\/6005707\/06006030.pdf?arnumber=6006030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:55:21Z","timestamp":1490097321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6006030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icccn.2011.6006030","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}