{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T05:05:39Z","timestamp":1724907939428},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/jsac.2008.080926","type":"journal-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T18:08:42Z","timestamp":1219860522000},"page":"1295-1301","source":"Crossref","is-referenced-by-count":17,"title":["Managing a Peer-to-Peer Data Storage System in a Selfish Society"],"prefix":"10.1109","volume":"26","author":[{"given":"Patrick","family":"Maille","sequence":"first","affiliation":[]},{"given":"Laszlo","family":"Toka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/945457.945458"},{"key":"ref11","author":"stefansson","year":"2006","journal-title":"MyriadStore"},{"key":"ref12","author":"besanko","year":"2005","journal-title":"Microeconomics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74430-6_12"},{"key":"ref14","article-title":"High availability in DHTs: Erasure coding vs.replication","author":"rodrigues","year":"2005","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364689"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872885"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.021"},{"key":"ref6","article-title":"Incentives for cooperation in peer-to-peer networks","author":"lai","year":"2003","journal-title":"Proc 1st Workshop on Economics of Peer-to-Peer Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501193"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"ref7","author":"batten","year":"2001","journal-title":"PStore A Secure Peer-to-Peer Backup System"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on Gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"ref1","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref9","article-title":"A cooperative internet backup scheme","author":"lillibridge","year":"2003","journal-title":"Proc 1st Workshop on Economics of Peer-to-Peer Systems"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/49\/4604726\/04604754.pdf?arnumber=4604754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:28:36Z","timestamp":1638217716000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4604754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":15,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2008.080926","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"value":"0733-8716","type":"print"},{"value":"1558-0008","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}