{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:48:08Z","timestamp":1725562088307},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,19]]},"DOI":"10.1145\/1133572.1133613","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Defending against eclipse attacks on overlay networks"],"prefix":"10.1145","author":[{"given":"Atul","family":"Singh","sequence":"first","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Miguel","family":"Castro","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]},{"given":"Peter","family":"Druschel","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Antony","family":"Rowstron","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2004,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633045"},{"key":"e_1_3_2_1_2_1","unstructured":"Bittorrent 2004. http:\/\/bitconjurer.org\/BitTorrent\/. Bittorrent 2004. http:\/\/bitconjurer.org\/BitTorrent\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687802"},{"key":"e_1_3_2_1_8_1","unstructured":"The Gnutella protocol specification 2000. http:\/\/dss.clip2.com\/GnutellaProtocol04.pdf. The Gnutella protocol specification 2000. http:\/\/dss.clip2.com\/GnutellaProtocol04.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863998"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39989-6_23"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. OSDI 2000","author":"Jannotti J.","year":"2000","unstructured":"J. Jannotti , D. K. Gifford , K. L. Johnson , M. F. Kaashoek , and J. W. O'Toole . Overcast : Reliable multicasting with an overlay network . In Proc. OSDI 2000 , San Diego, California , 2000 . J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O'Toole. Overcast: Reliable multicasting with an overlay network. In Proc. OSDI 2000, San Diego, California, 2000."},{"key":"e_1_3_2_1_13_1","unstructured":"KaZaa. http:\/\/www.kazaa.com\/. KaZaa. http:\/\/www.kazaa.com\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133578"},{"key":"e_1_3_2_1_15_1","unstructured":"MSPastry. http:\/\/research.microsoft.com\/~antr\/Pastry. MSPastry. http:\/\/research.microsoft.com\/~antr\/Pastry."},{"key":"e_1_3_2_1_16_1","unstructured":"OverNet 2004. http:\/\/www.overnet.com\/. OverNet 2004. http:\/\/www.overnet.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687940"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_21_1","volume-title":"1st IRIS Workshop","author":"Singh A.","year":"2003","unstructured":"A. Singh . Secure proximity aware routing . In 1st IRIS Workshop , Aug. 2003 . A. Singh. Secure proximity aware routing. In 1st IRIS Workshop, Aug. 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_23_1","volume-title":"INFOCOM96","author":"Zegura E.","year":"1996","unstructured":"E. Zegura , K. Calvert , and S. Bhattacharjee . How to model an internetwork . In INFOCOM96 , San Francisco , California , 1996 . E. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internetwork. In INFOCOM96, San Francisco, California, 1996."}],"event":{"name":"EW04: ACM SIGOPS European Workshop 2004","location":"Leuven Belgium","acronym":"EW04","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 11th workshop on ACM SIGOPS European workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1133572.1133613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:33:05Z","timestamp":1672965185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1133572.1133613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,19]]},"references-count":22,"alternative-id":["10.1145\/1133572.1133613","10.1145\/1133572"],"URL":"https:\/\/doi.org\/10.1145\/1133572.1133613","relation":{},"subject":[],"published":{"date-parts":[[2004,9,19]]},"assertion":[{"value":"2004-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}