{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:16:05Z","timestamp":1729653365015,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/p2p.2014.6934311","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T04:23:59Z","timestamp":1414815839000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["4P: Performant private peer-to-peer file sharing"],"prefix":"10.1109","author":[{"given":"Niels","family":"Zeilemaker","sequence":"first","affiliation":[]},{"given":"Johan","family":"Pouwelse","sequence":"additional","affiliation":[]},{"given":"Henk","family":"Sips","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-008-9162-7"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554908"},{"key":"17","article-title":"Load reduction in the kad peer-to-peer system","author":"steiner","year":"2007","journal-title":"Fifth International Workshop on Databases Information Systems and Peer-to-Peer Computing (DBISP2P"},{"key":"18","first-page":"1143","article-title":"Epidemic-style management of semantic overlays for content-based searching","author":"voulgaris","year":"2005","journal-title":"Euro-Par 2005 Parallel Processing Volume 3648 of Lecture Notes in Computer Science"},{"key":"15","first-page":"99","article-title":"Peer-to-peer architecture case study: Gnutella network","author":"ripeanu","year":"2001","journal-title":"Peer-to-Peer Computing 2001 Proceedings First International Conference on"},{"key":"16","first-page":"50","article-title":"Mapping the gnutella network","volume":"61","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Computing"},{"journal-title":"Retroshare Aims to Be A Private f2f Social Network","year":"2010","author":"retroshare","key":"13"},{"journal-title":"Turtle Router-retroshare","year":"2010","author":"retroshare","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707798"},{"journal-title":"Peer-to-Peer Streaming Peer Protocol (PPSPP)","year":"2013","author":"bakker","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072433"},{"key":"2","article-title":"Hashcash- A denial of service counter-measure","author":"back","year":"2002","journal-title":"Technical Report"},{"journal-title":"Gnutella Protocol Specification 0 6","year":"0","key":"1"},{"key":"10","first-page":"161","article-title":"An analysis of gnunet and the implications for anonymous, censorship-resistant networks","author":"kgler","year":"2003","journal-title":"Privacy Enhancing Technologies Volume 2760 of Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000031629.31935.ac"},{"key":"6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"journal-title":"The Gnet Whitepaper","year":"2002","author":"bennett","key":"5"},{"journal-title":"An Encoding for Censorship-resistant Sharing","year":"2003","author":"bennett","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851198"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011419012209"}],"event":{"name":"2014 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2014,9,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2014,9,12]]}},"container-title":["14-th IEEE International Conference on Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6926645\/6934289\/06934311.pdf?arnumber=6934311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:25:58Z","timestamp":1498173958000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/p2p.2014.6934311","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}