{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2011:2LKGM362R2HB2BWM5ZMV3RSGYX","short_pith_number":"pith:2LKGM362","canonical_record":{"source":{"id":"1104.0594","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-04-04T15:05:14Z","cross_cats_sorted":[],"title_canon_sha256":"cd413fb5045998e0e9f730ca9681809989329d10be90df0d04e3beeed4c4985b","abstract_canon_sha256":"b57ac516378e5a921b21f0495921451184d9b33ab4b60ecbaea4b1e288c9ad6d"},"schema_version":"1.0"},"canonical_sha256":"d2d4666fda8e8e1d06ccee595dc646c5cf66750f163e8c04d28148e714c460fa","source":{"kind":"arxiv","id":"1104.0594","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1104.0594","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"arxiv_version","alias_value":"1104.0594v1","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1104.0594","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"pith_short_12","alias_value":"2LKGM362R2HB","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_16","alias_value":"2LKGM362R2HB2BWM","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_8","alias_value":"2LKGM362","created_at":"2026-05-18T12:26:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2011:2LKGM362R2HB2BWM5ZMV3RSGYX","target":"record","payload":{"canonical_record":{"source":{"id":"1104.0594","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-04-04T15:05:14Z","cross_cats_sorted":[],"title_canon_sha256":"cd413fb5045998e0e9f730ca9681809989329d10be90df0d04e3beeed4c4985b","abstract_canon_sha256":"b57ac516378e5a921b21f0495921451184d9b33ab4b60ecbaea4b1e288c9ad6d"},"schema_version":"1.0"},"canonical_sha256":"d2d4666fda8e8e1d06ccee595dc646c5cf66750f163e8c04d28148e714c460fa","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:25:03.838404Z","signature_b64":"kEOt19ZryU3sIie7a3xjdxxWPxkTWTNH1TS+oONfeq8VtPkzXM0pi2wia+7J6YlzfpzoTTrJbD1JX/BbHx44Bg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d2d4666fda8e8e1d06ccee595dc646c5cf66750f163e8c04d28148e714c460fa","last_reissued_at":"2026-05-18T04:25:03.837924Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:25:03.837924Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1104.0594","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:25:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pVdeqfWIuzRrLaTQo6kqDoiogXrNzjtNfRXhr/ZSqUP82HvKxFfPxvZszKRX9OM0gmOOHffRvtjzbGB4VT68Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T19:33:09.670254Z"},"content_sha256":"f9e96e58c67877b2a35fa4d84f52dbd760cfdbf3f05788c2be22160bdaf6aed3","schema_version":"1.0","event_id":"sha256:f9e96e58c67877b2a35fa4d84f52dbd760cfdbf3f05788c2be22160bdaf6aed3"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2011:2LKGM362R2HB2BWM5ZMV3RSGYX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Pan Hui, Ranjan Pal","submitted_at":"2011-04-04T15:05:14Z","abstract_excerpt":"Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term 'effort', we imply the amount of investments made by a user in security mechanisms like antivirus softwares, firewalls, etc., to improve its security. However, often due to the large magnitude "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1104.0594","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:25:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"qo97waB4j+dLIy8Owqu29oP1tAAmC+fssIeiY47xwaQWGzuRvO2HKwVSMyz83GXTIl4C8NrUiQDSZJOSwaNqAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T19:33:09.671023Z"},"content_sha256":"23c2c251b48eaf4504bc36104f338c83248cf50569397def0327237d47273b55","schema_version":"1.0","event_id":"sha256:23c2c251b48eaf4504bc36104f338c83248cf50569397def0327237d47273b55"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/bundle.json","state_url":"https://pith.science/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T19:33:09Z","links":{"resolver":"https://pith.science/pith/2LKGM362R2HB2BWM5ZMV3RSGYX","bundle":"https://pith.science/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/bundle.json","state":"https://pith.science/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/2LKGM362R2HB2BWM5ZMV3RSGYX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2011:2LKGM362R2HB2BWM5ZMV3RSGYX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"b57ac516378e5a921b21f0495921451184d9b33ab4b60ecbaea4b1e288c9ad6d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-04-04T15:05:14Z","title_canon_sha256":"cd413fb5045998e0e9f730ca9681809989329d10be90df0d04e3beeed4c4985b"},"schema_version":"1.0","source":{"id":"1104.0594","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1104.0594","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"arxiv_version","alias_value":"1104.0594v1","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1104.0594","created_at":"2026-05-18T04:25:03Z"},{"alias_kind":"pith_short_12","alias_value":"2LKGM362R2HB","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_16","alias_value":"2LKGM362R2HB2BWM","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_8","alias_value":"2LKGM362","created_at":"2026-05-18T12:26:18Z"}],"graph_snapshots":[{"event_id":"sha256:23c2c251b48eaf4504bc36104f338c83248cf50569397def0327237d47273b55","target":"graph","created_at":"2026-05-18T04:25:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term 'effort', we imply the amount of investments made by a user in security mechanisms like antivirus softwares, firewalls, etc., to improve its security. However, often due to the large magnitude ","authors_text":"Pan Hui, Ranjan Pal","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-04-04T15:05:14Z","title":"Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1104.0594","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f9e96e58c67877b2a35fa4d84f52dbd760cfdbf3f05788c2be22160bdaf6aed3","target":"record","created_at":"2026-05-18T04:25:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"b57ac516378e5a921b21f0495921451184d9b33ab4b60ecbaea4b1e288c9ad6d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-04-04T15:05:14Z","title_canon_sha256":"cd413fb5045998e0e9f730ca9681809989329d10be90df0d04e3beeed4c4985b"},"schema_version":"1.0","source":{"id":"1104.0594","kind":"arxiv","version":1}},"canonical_sha256":"d2d4666fda8e8e1d06ccee595dc646c5cf66750f163e8c04d28148e714c460fa","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d2d4666fda8e8e1d06ccee595dc646c5cf66750f163e8c04d28148e714c460fa","first_computed_at":"2026-05-18T04:25:03.837924Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:25:03.837924Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"kEOt19ZryU3sIie7a3xjdxxWPxkTWTNH1TS+oONfeq8VtPkzXM0pi2wia+7J6YlzfpzoTTrJbD1JX/BbHx44Bg==","signature_status":"signed_v1","signed_at":"2026-05-18T04:25:03.838404Z","signed_message":"canonical_sha256_bytes"},"source_id":"1104.0594","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f9e96e58c67877b2a35fa4d84f52dbd760cfdbf3f05788c2be22160bdaf6aed3","sha256:23c2c251b48eaf4504bc36104f338c83248cf50569397def0327237d47273b55"],"state_sha256":"dfb28f5c144631f1a0ac78d633517be24d7e433d037fb75dc33476a5f4b34631"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/nWK/E7AoIUSl3uqEEZ1sD8RCHGJ2oSmqysofkO0WjB4Ic/dpE58UxFnScFZQ0tNP9nA/tllnZdrtQMvoEofCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T19:33:09.674871Z","bundle_sha256":"980188878aabc304d566224f512c4ba6edce0dd3278d990f155f360c39f1c651"}}