{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:33:03Z","timestamp":1773959583762,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000646","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["JP20H04187"],"award-info":[{"award-number":["JP20H04187"]}],"id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,8]]},"DOI":"10.1109\/ccnc51644.2023.10060672","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T17:17:55Z","timestamp":1679073475000},"page":"810-816","source":"Crossref","is-referenced-by-count":2,"title":["Ensuring Content Integrity and Confidentiality in Information-Centric Secure Networks"],"prefix":"10.1109","author":[{"given":"Htet Htet","family":"Hlaing","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology (NICT),Japan"}]},{"given":"Hitoshi","family":"Asaeda","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology (NICT),Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8609","article-title":"Content-Centric Networking (CCNx) Messages in TLV Format","volume-title":"RFC 8609","author":"Mosko","year":"2019"},{"key":"ref3","volume-title":"Named data networking (ndn) project","author":"Zhang","year":"2012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3442150"},{"issue":"11","key":"ref6","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2018.1701086","article-title":"Content protection in named data networking: Challenges and potential solutions","volume":"56","author":"Yu","year":"2018","journal-title":"IEEE Communications Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365742"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000026"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7927","article-title":"Information-Centric Networking (ICN) Research Challenges","volume-title":"RFC 7927","author":"Kutscher","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996804"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/CCNC.2014.6940528","article-title":"Flexible end-to-end content security in CCN","volume-title":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","author":"Wood","year":"2014"},{"issue":"11","key":"ref15","doi-asserted-by":"crossref","first-page":"e3571","DOI":"10.1002\/dac.3571","article-title":"An authenticated re-encryption scheme for secure file transfer in named data networks","volume":"31","author":"Tseng","year":"2018","journal-title":"International Journal of Communication Systems"},{"issue":"6","key":"ref16","doi-asserted-by":"crossref","DOI":"10.1002\/ett.3565","article-title":"An edge re-encryption-based access control mechanism in NDN","volume":"30","author":"Zhu","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2016.10.018","article-title":"Up-to-date key retrieval for information centric networking","volume":"112","author":"Mauri","year":"2017","journal-title":"Computer Networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2580299"},{"key":"ref19","first-page":"19","article-title":"Advanced encryption standard","volume-title":"Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology","author":"Rijmen","year":"2001"},{"key":"ref20","volume-title":"PBC: The Pairing-Based Cryptography Arithmetic Library","author":"Lynn"},{"key":"ref21","volume-title":"GNU MP: The GNU Multiple Precision Arithmetic Library","author":"Granlund"},{"key":"ref22","volume-title":"Libraries\/ndn platform","year":"2022"},{"key":"ref23","volume-title":"ndnsim 2: An updated ndn simulator for ns-3","author":"Mastorakis","year":"2016"}],"event":{"name":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2023,1,8]]},"end":{"date-parts":[[2023,1,11]]}},"container-title":["2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10059462\/10059600\/10060672.pdf?arnumber=10060672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T02:47:14Z","timestamp":1709434034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10060672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccnc51644.2023.10060672","relation":{},"subject":[],"published":{"date-parts":[[2023,1,8]]}}}