Securing Structured Overlays against Identity Attacks | IEEE Journals & Magazine | IEEE Xplore