Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/p2p/ZhaiCCZLSQTC09
%A Zhai, Ennan
%A Chen, Ruichuan
%A Cai, Zhuhua
%A Zhang, Long
%A Lua, Eng Keong
%A Sun, Huiping
%A Qing, Sihan
%A Tang, Liyong
%A Chen, Zhong
%B Peer-to-Peer Computing
%D 2009
%E Schulzrinne, Henning
%E Aberer, Karl
%E Datta, Anwitaman
%I IEEE
%K dblp
%P 11-20
%T Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
%U http://dblp.uni-trier.de/db/conf/p2p/p2p2009.html#ZhaiCCZLSQTC09
%@ 978-1-4244-5066-4
@inproceedings{conf/p2p/ZhaiCCZLSQTC09,
added-at = {2018-02-21T00:00:00.000+0100},
author = {Zhai, Ennan and Chen, Ruichuan and Cai, Zhuhua and Zhang, Long and Lua, Eng Keong and Sun, Huiping and Qing, Sihan and Tang, Liyong and Chen, Zhong},
biburl = {https://www.bibsonomy.org/bibtex/2892389e0b55213078a4bb31e5d73e727/dblp},
booktitle = {Peer-to-Peer Computing},
crossref = {conf/p2p/2009},
editor = {Schulzrinne, Henning and Aberer, Karl and Datta, Anwitaman},
ee = {https://doi.org/10.1109/P2P.2009.5284532},
interhash = {6f1ae0df86056800f1571c853fc2b3a7},
intrahash = {892389e0b55213078a4bb31e5d73e727},
isbn = {978-1-4244-5066-4},
keywords = {dblp},
pages = {11-20},
publisher = {IEEE},
timestamp = {2018-02-22T11:39:52.000+0100},
title = {Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.},
url = {http://dblp.uni-trier.de/db/conf/p2p/p2p2009.html#ZhaiCCZLSQTC09},
year = 2009
}