{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:13:19Z","timestamp":1737177199502,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380815"},{"type":"electronic","value":"9783642380822"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38082-2_4","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T08:43:53Z","timestamp":1366620233000},"page":"39-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Minimal Core for Information-Centric Networking"],"prefix":"10.1007","author":[{"given":"Kari","family":"Visala","sequence":"first","affiliation":[]},{"given":"Dmitrij","family":"Lagutin","sequence":"additional","affiliation":[]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking Named Content. In: ACM CoNEXT 2009 (2009)","DOI":"10.1145\/1658939.1658941"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Koponen, T., Chawla, M., Chun, B.G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A Data-Oriented (and Beyond) Network Architecture. In: SIGCOMM: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, vol.\u00a037, pp. 181\u2013192 (2007)","DOI":"10.1145\/1282427.1282402"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Dannewitz, C., Goli\u0107, J., Ohlman, B., Bengt, A.: Secure Naming for a Network of Information. In: 13th IEEE Global Internet Symposium 2010 (2010)","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"4_CR4","unstructured":"Trossen, D., Parisis, G., Visala, K., Gajic, B., Riihij\u00e4rvi, J., Flegkas, P., Sarolahti, P., Jokela, P., Vasilakos, X., Tsilopoulos, C., Arianfar, S.: PURSUIT Deliverable D2.2: Conceptual Architecture: Principles, patterns and sub-components descriptions. Technical report, PURSUIT (2011)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A Survey of Information-Centric Networking (Draft). In: Dagstuhl Seminar Proceedings (February 2011)","DOI":"10.1109\/MCOM.2012.6231276"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10550-006-0084-z","volume":"24","author":"M. Handley","year":"2006","unstructured":"Handley, M.: Why the Internet only just works. BT Technology Journal\u00a024(3), 119\u2013129 (2006)","journal-title":"BT Technology Journal"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1341431.1341436","volume":"38","author":"C. Dovrolis","year":"2008","unstructured":"Dovrolis, C.: What would Darwin Think about Clean-Slate Architectures? ACM SIGCOMM Computer Communication Review\u00a038(1), 29\u201334 (2008)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Akhshabi, S., Dovrolis, C.: The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture. In: SIGCOMM 2011 (2011)","DOI":"10.1145\/2018436.2018460"},{"key":"4_CR9","unstructured":"Ananthanarayanan, G., Heimerl, K., Demmer, M., Koponen, T., Tavakoli, A., Shenker, S., Stoica, I.: Enabling Innovation Below the Communication API. Technical report, University of California at Berkeley (October 2009)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet Indirection Infrastructure. In: SIGCOMM 2002 (2002)","DOI":"10.1145\/633030.633033"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-540-74853-3_23","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"J. Su","year":"2007","unstructured":"Su, J., Scott, J., Hui, P., Crowcroft, J., de Lara, E., Diot, C., Goel, A., Lim, M.H., Upton, E.: Haggle: Seamless Networking for Mobile Applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 391\u2013408. Springer, Heidelberg (2007)"},{"key":"4_CR12","unstructured":"Filinski, A.: Declarative Continuations and Categorical Duality. Master\u2019s thesis, University of Copenhagen (August 1989)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-20898-0_12","volume-title":"Future Internet Assembly","author":"K. Visala","year":"2011","unstructured":"Visala, K., Lagutin, D., Tarkoma, S.: Security design for an inter-domain publish\/subscribe architecture. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol.\u00a06656, pp. 167\u2013176. Springer, Heidelberg (2011)"},{"key":"4_CR14","unstructured":"Narayanan, A., Oran, D.: NDN AND IP ROUTING - CAN IT SCALE? presentation in ICNRG side meeting, IETF-82, Taipei"},{"key":"4_CR15","unstructured":"Hewitt, C., Baker, H.: Laws for Communicating Parallel Processes. In: IFIP 1977 (1977)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Carpenter, B.: rfc1958: Architectural Principles of the Internet. Technical report, IETF (June 1996)","DOI":"10.17487\/rfc1958"}],"container-title":["Lecture Notes in Computer Science","The Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38082-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:21:53Z","timestamp":1737123713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38082-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380815","9783642380822"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38082-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}