{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T08:30:20Z","timestamp":1748939420443,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1822567"],"award-info":[{"award-number":["1822567"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2934049","type":"journal-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T19:54:31Z","timestamp":1565294071000},"page":"110159-110173","source":"Crossref","is-referenced-by-count":10,"title":["Decentralized Distribution of PCP Mappings Over Blockchain for End-to-End Secure Direct Communications"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1236-6168","authenticated-orcid":false,"given":"Elie F.","family":"Kfoury","sequence":"first","affiliation":[]},{"given":"Jose","family":"Gomez","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Crichigno","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]},{"given":"David","family":"Khoury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"PCP Client Library","year":"2018","key":"ref39"},{"journal-title":"OpenFlow 1 3 Software Switch","year":"2014","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9675050"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"journal-title":"TLSnotary - a mechanism for independently audited https sessions","year":"2014","key":"ref30"},{"journal-title":"Ryu Sdn Framework","year":"2016","key":"ref37"},{"journal-title":"Port Control Protocol in Software Defined Networks","year":"2015","author":"burda","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24315-3_1"},{"key":"ref34","first-page":"30","article-title":"Software-defined networking","volume":"17","author":"mckeown","year":"2009","journal-title":"INFOCOM Keynote Talk"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8555"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.8441204"},{"journal-title":"Signing HTTP Messages Version 11","year":"2018","author":"cavage","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1668388"},{"journal-title":"Traditional IP Network Address Translator (Traditional NAT)","year":"2000","author":"srisuresh","key":"ref1"},{"journal-title":"Port Control Protocol (PCP) Authentication Mechanism","year":"2015","author":"reddy","key":"ref20"},{"key":"ref22","first-page":"466","article-title":"The hitchhiker&#x2019;s guide to DNS cache poisoning","author":"son","year":"2010","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6763"},{"key":"ref24","article-title":"Bitsquatting: DNS hijacking without exploitation","author":"dinaburg","year":"2011","journal-title":"Proceedings of BlackHat Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_21"},{"journal-title":"E3 Marketing Group How Often Do Ip Addresses Change?","year":"2019","key":"ref50"},{"key":"ref10","article-title":"A review of man-in-the-middle attacks","author":"gangan","year":"2015","journal-title":"arXiv 1504 02115"},{"journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger","year":"2014","author":"wood","key":"ref11"},{"journal-title":"Web3j&#x2014;Lightweight Java Library for Integration With Ethereum Clients","year":"2019","author":"svensson","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249088"},{"journal-title":"On Abstraction Ethereum Blog","year":"2015","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2685328.2685334"},{"article-title":"Method of providing digital signatures","year":"1982","author":"merkle","key":"ref17"},{"journal-title":"Ethereum light client protocol","year":"2016","author":"buterin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6886"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5766"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5389"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5128"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5245"},{"journal-title":"Final Report on Diginotar Hack Shows Total Compromise of CA Servers Threatpost","year":"2012","author":"fisher","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6887"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.08.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.367"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876971"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720760"},{"journal-title":"High Performance Browser Networking What Every Web Developer Should Know about Networking and Browser Performance","year":"2013","author":"grigorik","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3492-1_2"},{"journal-title":"Bouncy Castle Crypto APIs","year":"2019","key":"ref44"},{"journal-title":"Understanding Oracles","year":"2016","author":"bertani","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6287639\/8600701\/8792050-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08792050.pdf?arnumber=8792050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:48Z","timestamp":1649444028000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8792050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2934049","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}