{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:22Z","timestamp":1755993682557,"version":"3.44.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/ccnc.2015.7158057","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T17:51:14Z","timestamp":1437069074000},"page":"654-662","source":"Crossref","is-referenced-by-count":2,"title":["Scalable point-to-multipoint communication for cloud networking using information-centric networking"],"prefix":"10.1109","author":[{"given":"E. Anders","family":"Eriksson","sequence":"first","affiliation":[{"name":"Ericsson Research, Sweden"}]},{"given":"B\u00f6rje","family":"Ohlman","sequence":"additional","affiliation":[{"name":"Ericsson Research, Sweden"}]},{"given":"Karl-\u00c5ke","family":"Persson","sequence":"additional","affiliation":[{"name":"Ericsson Research, Sweden"}]},{"given":"Adeel Mohammad","family":"Malik","sequence":"additional","affiliation":[{"name":"Ericsson Research, Sweden"}]},{"given":"Marcus","family":"Ihlar","sequence":"additional","affiliation":[{"name":"Ericsson, Sweden"}]},{"given":"Linus","family":"Sunde","sequence":"additional","affiliation":[{"name":"Uppsala University, Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"article-title":"Constrained application protocol (coap), internet draft: draft-ietf-core-coap-18, (work in progress)","year":"2013","author":"shelby","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2009.27"},{"year":"0","key":"ref13","article-title":"Dynamic adaptive streaming over http, mpeg-dash, iso\/iec 23009-1:2012"},{"key":"ref14","article-title":"Naming Things with Hashes","author":"farrell","year":"2013","journal-title":"RFC 6920 (Proposed Standard)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"article-title":"Observing resources in coap, internet draft: draft-ietf-core-observe-13 (work in progress)","year":"2014","author":"hartke","key":"ref16"},{"article-title":"Core resource directory, internet draft: draft-ietf-core-resource-directory-02 (work in progress)","year":"2014","author":"shelby","key":"ref17"},{"article-title":"Californium protocol stack","year":"0","author":"kovatsch","key":"ref18"},{"year":"0","key":"ref19","article-title":"Contiki"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"ref3","article-title":"Survey Report on Protocol Independent Multicast - Sparse Mode (PIM-SM) Implementations and Deployments","author":"zheng","year":"2013","journal-title":"RFC 7063 (Informational)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018587"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592592"},{"key":"ref2","article-title":"Source-Specific Multicast for IP","author":"holbrook","year":"2006","journal-title":"RFC 4607 (Proposed Standard)"},{"key":"ref1","article-title":"Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)","author":"fenner","year":"2006","journal-title":"RFC 4601 (Proposed Standard)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486023"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1145\/2534169.2491717","article-title":"Toward content-centric privacy in icn: Attribute-based encryption and routing","volume":"43","author":"ion","year":"2013","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466661"}],"event":{"name":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2015,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,1,12]]}},"container-title":["2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7151874\/7157933\/07158057.pdf?arnumber=7158057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:26:14Z","timestamp":1755908774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7158057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2015.7158057","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}