{"id":"https://openalex.org/W2006451175","doi":"https://doi.org/10.1109/cts.2014.6867595","title":"Secure distributed data structures for peer-to-peer-based social networks","display_name":"Secure distributed data structures for peer-to-peer-based social networks","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2006451175","doi":"https://doi.org/10.1109/cts.2014.6867595","mag":"2006451175"},"language":"en","primary_location":{"id":"doi:10.1109/cts.2014.6867595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2014.6867595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046570381","display_name":"Jens Janiuk","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jens Janiuk","raw_affiliation_strings":["Department of Computer Science, University of Paderborn, Germany","Department of Computer Science, University of Paderborn, Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]},{"raw_affiliation_string":"Department of Computer Science, University of Paderborn, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078494236","display_name":"Alexander M\u00e4cker","orcid":null},"institutions":[{"id":"https://openalex.org/I44260953","display_name":"Heinrich Heine University D\u00fcsseldorf","ror":"https://ror.org/024z2rq82","country_code":"DE","type":"education","lineage":["https://openalex.org/I44260953"]},{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Macker","raw_affiliation_strings":["Department of Computer Science, University of Dusseldorf, Germany","Department of Computer Science, University of Paderborn, Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Dusseldorf, Germany","institution_ids":["https://openalex.org/I44260953"]},{"raw_affiliation_string":"Department of Computer Science, University of Paderborn, Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033620830","display_name":"K\u00e1lm\u00e1n Graffi","orcid":"https://orcid.org/0000-0003-1708-6835"},"institutions":[{"id":"https://openalex.org/I44260953","display_name":"Heinrich Heine University D\u00fcsseldorf","ror":"https://ror.org/024z2rq82","country_code":"DE","type":"education","lineage":["https://openalex.org/I44260953"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kalman Graffi","raw_affiliation_strings":["Department of Computer Science, University of Dusseldorf, Germany","Department of Computer Science, University of D\u00fcsseldorf, D\u00fcsseldorf, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Dusseldorf, Germany","institution_ids":["https://openalex.org/I44260953"]},{"raw_affiliation_string":"Department of Computer Science, University of D\u00fcsseldorf, D\u00fcsseldorf, Germany","institution_ids":["https://openalex.org/I44260953"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046570381"],"corresponding_institution_ids":["https://openalex.org/I206945453"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73318105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"396","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.8808484077453613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8427023887634277},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.652675211429596},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5698280930519104},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.520520806312561},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.508433997631073},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4608357548713684},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.45566171407699585},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.44818735122680664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44590508937835693},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44312146306037903},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.41529107093811035},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25041496753692627},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21854478120803833},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18151798844337463}],"concepts":[{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.8808484077453613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8427023887634277},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.652675211429596},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5698280930519104},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.520520806312561},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.508433997631073},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4608357548713684},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.45566171407699585},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.44818735122680664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44590508937835693},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44312146306037903},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.41529107093811035},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25041496753692627},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21854478120803833},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18151798844337463},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cts.2014.6867595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2014.6867595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W118100702","https://openalex.org/W1493291133","https://openalex.org/W1577904438","https://openalex.org/W1606845586","https://openalex.org/W1909645032","https://openalex.org/W1957582590","https://openalex.org/W1974406957","https://openalex.org/W1984599464","https://openalex.org/W2026001133","https://openalex.org/W2062483570","https://openalex.org/W2063944978","https://openalex.org/W2067513685","https://openalex.org/W2081214630","https://openalex.org/W2097820988","https://openalex.org/W2110515707","https://openalex.org/W2113787220","https://openalex.org/W2114100569","https://openalex.org/W2116648071","https://openalex.org/W2117410972","https://openalex.org/W2119084378","https://openalex.org/W2122048208","https://openalex.org/W2126964159","https://openalex.org/W2141275242","https://openalex.org/W2141937798","https://openalex.org/W2145531774","https://openalex.org/W2146696793","https://openalex.org/W2155330476","https://openalex.org/W2158049821","https://openalex.org/W2160752523","https://openalex.org/W2167898414","https://openalex.org/W2322783278","https://openalex.org/W6604828789","https://openalex.org/W6677779725","https://openalex.org/W6684507281","https://openalex.org/W6700471957"],"related_works":["https://openalex.org/W2360647157","https://openalex.org/W2129548282","https://openalex.org/W1538138089","https://openalex.org/W4231474778","https://openalex.org/W1591638986","https://openalex.org/W2165455600","https://openalex.org/W2058225515","https://openalex.org/W53691026","https://openalex.org/W2098291054","https://openalex.org/W2107811890"],"abstract_inverted_index":{"Online":[0],"social":[1,17,29,87,152],"networks":[2,30],"are":[3,113],"attracting":[4],"billions":[5],"of":[6,42],"nowadays,":[7],"both":[8],"on":[9,171],"a":[10,53,83,91,148],"global":[11],"scale":[12],"as":[13,15,77],"well":[14],"in":[16,66,81,102,105,147],"enterprise":[18],"networks.":[19,153],"Using":[20],"distributed":[21,73,84,93,107,133,158],"hash":[22,108],"tables":[23],"and":[24,35,69,118,124,141,143,145,163,167],"peer-to-peer":[25,149],"technology":[26],"allows":[27],"online":[28,86],"to":[31,71,165],"be":[32],"operated":[33],"securely":[34],"efficiently":[36],"only":[37],"by":[38,52],"using":[39],"the":[40,43,62,99,106,157,169],"resources":[41],"user":[44],"devices,":[45],"thus":[46],"alleviating":[47],"censorship":[48],"or":[49,79],"data":[50,74,95,159],"misuse":[51],"single":[54,122],"network":[55],"operator.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60],"address":[61],"challenges":[63],"that":[64,97,156,168],"arise":[65],"implementing":[67],"reliably":[68],"conveniently":[70],"use":[72,166],"structures,":[75],"such":[76,82],"lists":[78,134],"sets,":[80,142],"hash-table-based":[85],"network.":[88],"We":[89],"present":[90],"secure,":[92],"list":[94,100,111],"structure":[96,160],"manages":[98],"entries":[101,112],"several":[103],"buckets":[104],"table.":[109],"The":[110,129],"authenticated,":[114],"integrity":[115],"is":[116,127,135,161],"maintained":[117],"access":[119],"control":[120],"for":[121,131,138,151],"users":[123],"also":[125,136],"groups":[126],"integrated.":[128],"approach":[130],"secure":[132],"applied":[137],"prefix":[139],"trees":[140],"implemented":[144],"evaluated":[146],"framework":[150],"Evaluation":[154],"shows":[155],"convenient":[162],"efficient":[164],"requirements":[170],"security":[172],"hold.":[173]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
