{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:30:49Z","timestamp":1729661449959,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/bcfic.2012.6217985","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T08:18:13Z","timestamp":1340266693000},"page":"84-91","source":"Crossref","is-referenced-by-count":0,"title":["Using a gateway overlay network to achieve secure and scalable network interconnection"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Martinez-Julia","sequence":"first","affiliation":[]},{"given":"Antonio F.","family":"Skarmeta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866866"},{"journal-title":"Series X Data Networks Open System Communications and Security Cyberspace Security - Identity Management Baseline Capabilities for Enhancing Global Identity Management and Interoperability Recommendation ITU-T X 1250","year":"2009","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"Proceedings of the First International Workshop on Peer-to-Peer Systems"},{"journal-title":"LISP alternative topology (LISP+ALT)","year":"2011","author":"fuller","key":"15"},{"journal-title":"LISP-CONS A Content distribution Overlay Network Service for LISP","year":"2008","author":"brim","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544073"},{"key":"14","first-page":"23","article-title":"The locator identifier separation protocol (lisp)","volume":"11","author":"meyer","year":"2008","journal-title":"The Internet Protocol Journal"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826279"},{"key":"12","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/383059.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proceedings of the 2001 conference on Applications technologies architectures and protocols for computer communications"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2010.5729418"},{"journal-title":"Chinese ISP Hijacked 10% of the Internet","year":"2010","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781042"},{"journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","year":"2008","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6227"},{"key":"10","first-page":"1","article-title":"Protecting digital identities in future networks","author":"martinez-julia","year":"2011","journal-title":"2011 Future Network & Mobile Summit FutureNetw"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.478"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"journal-title":"Pursuing A Pub\/Sub Internet (PURSUIT)","year":"2011","author":"trossen","key":"5"},{"journal-title":"Architectural Principles of the Internet","year":"1996","author":"carpenter","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.436"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E94.B.2216"}],"event":{"name":"2012 2nd Baltic Congress on Future Internet Communications (BCFIC)","start":{"date-parts":[[2012,4,25]]},"location":"Vilnius, Lithuania","end":{"date-parts":[[2012,4,27]]}},"container-title":["2012 2nd Baltic Congress on Future Internet Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6211448\/6217945\/06217985.pdf?arnumber=6217985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T00:50:39Z","timestamp":1642553439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6217985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/bcfic.2012.6217985","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}