{"id":"https://openalex.org/W4254211332","doi":"https://doi.org/10.1109/ptp.2004.1334928","title":"Information leak in the chord lookup protocol","display_name":"Information leak in the chord lookup protocol","publication_year":2004,"publication_date":"2004-11-08","ids":{"openalex":"https://openalex.org/W4254211332","doi":"https://doi.org/10.1109/ptp.2004.1334928"},"language":"en","primary_location":{"id":"doi:10.1109/ptp.2004.1334928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ptp.2004.1334928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044279601","display_name":"Colm P. O\u2019Donnell","orcid":"https://orcid.org/0000-0002-8004-450X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"C.W. O'Donnell","raw_affiliation_strings":["MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, USA"],"affiliations":[{"raw_affiliation_string":"MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000240220","display_name":"Vinod Vaikuntanathan","orcid":"https://orcid.org/0000-0002-2666-0045"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"V. Vaikuntanathan","raw_affiliation_strings":["MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, USA"],"affiliations":[{"raw_affiliation_string":"MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044279601"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3491,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86228313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"28","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chord","display_name":"Chord (peer-to-peer)","score":0.7662289142608643},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7572318315505981},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44817861914634705},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3677194118499756},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.10273575782775879}],"concepts":[{"id":"https://openalex.org/C194147245","wikidata":"https://www.wikidata.org/wiki/Q1076368","display_name":"Chord (peer-to-peer)","level":2,"score":0.7662289142608643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7572318315505981},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44817861914634705},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3677194118499756},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.10273575782775879},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ptp.2004.1334928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ptp.2004.1334928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.58.7976","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.7976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://femto.org/p2p2004/papers/odonnell.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W113443376","https://openalex.org/W1542162318","https://openalex.org/W2020765652","https://openalex.org/W2106101127","https://openalex.org/W2118428193","https://openalex.org/W2161721751","https://openalex.org/W2162297215","https://openalex.org/W2163674653","https://openalex.org/W3217684393","https://openalex.org/W4254857363","https://openalex.org/W6632738333","https://openalex.org/W6636851552","https://openalex.org/W6683665485"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2351864507","https://openalex.org/W3159818711","https://openalex.org/W3215212221","https://openalex.org/W2753058862","https://openalex.org/W2042398445","https://openalex.org/W2070360846","https://openalex.org/W2883093918","https://openalex.org/W4281616442","https://openalex.org/W4287332183"],"abstract_inverted_index":{"In":[0],"peer-to-peer":[1],"(P2P)":[2],"systems,":[3],"it":[4],"is":[5],"often":[6],"essential":[7],"that":[8],"connected":[9],"systems":[10],"(nodes)":[11],"relay":[12],"messages":[13],"which":[14],"did":[15],"not":[16],"originate":[17],"locally,":[18],"on":[19,134],"to":[20,33,125],"the":[21,41,45,63,67,70,90,98,110,113,122,135],"greater":[22],"network.":[23],"As":[24],"a":[25,35,74,101],"result,":[26],"an":[27,53,82],"intermediate":[28],"node":[29,84,88],"might":[30],"be":[31],"able":[32],"determine":[34],"large":[36],"amount":[37,136],"of":[38,48,69,79,100,112,115,137],"information":[39,80,138],"about":[40,86],"system,":[42],"such":[43],"as":[44,118,128],"querying":[46],"tendencies":[47],"other":[49],"nodes.":[50],"This":[51],"represents":[52],"inherent":[54],"security":[55],"issue":[56],"in":[57,73,89,97],"P2P":[58,75,103],"networks.":[59],"Therefore,":[60],"we":[61],"ask":[62],"following":[64],"question:":[65],"through":[66],"observation":[68],"network":[71],"traffic":[72],"network,":[76],"what":[77],"kind":[78],"can":[81],"adversarial":[83],"learn":[85],"another":[87],"same":[91],"network?":[92],"We":[93,107],"study":[94,109],"this":[95],"question":[96],"case":[99],"specific":[102],"system":[104],"-":[105],"Chord.":[106],"also":[108],"effects":[111],"parameters":[114],"Chord":[116,126],"(such":[117,127],"finger-table":[119],"size)":[120],"and":[121,131],"various":[123],"enhancements":[124],"location":[129],"caching":[130],"data":[132],"caching)":[133],"leaked.":[139]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
