{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:15Z","timestamp":1730211675657,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679374","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"01-06","source":"Crossref","is-referenced-by-count":0,"title":["Peer-to-Peer Meets Onion: The Veilid Framework"],"prefix":"10.1109","author":[{"given":"Sven","family":"Glatzer","sequence":"first","affiliation":[{"name":"School of Computing, University of Portsmouth"}]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth"}]},{"given":"Rinat","family":"Khusainov","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth"}]},{"given":"Rahim","family":"Taheri","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"article-title":"Veilid","volume-title":"Veilid Foundation Inc","year":"2023","key":"ref3"},{"article-title":"Framework overview - veilid","volume-title":"Veilid Foundation Inc","year":"2023","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"volume-title":"Onion routing network for securely moving data through communication networks","year":"2001","author":"Reed","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"ref9","first-page":"68","author":"Dingledine","year":"2009","journal-title":"Performance improvements on tor or, why tor is slow and what were going to do about it"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2946802"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093615"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3350006"},{"key":"ref13","article-title":"IPFS - content addressed, versioned, P2P file system","volume":"abs\/l407.3561","author":"Benet","year":"2014","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/asi.5090040104"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3143147"},{"key":"ref16","first-page":"18","article-title":"Democratizing content publication with coral","volume":"4","author":"Freedman","year":"2004","journal-title":"NSDI"},{"key":"ref17","article-title":"Accelerating content routing with bitswap: A multi-path file transfer protocol in ipfs and filecoin","author":"De La Rocha","year":"2021","journal-title":"Protocol Labs"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544232"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00069"},{"volume-title":"Documentation - veilid","year":"2023","key":"ref21"},{"article-title":"veilid-core\/doc\/guide\/guide.md","volume-title":"Veilid Foundation Inc","year":"2023","key":"ref22"},{"article-title":"Veilid 1 veilid. gitlab","volume-title":"Veilid Foundation Inc","year":"2024","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7748"},{"key":"ref26","article-title":"Extending the salsa20 nonce","volume-title":"Workshop record of Symmetric Key Encryption Workshop","volume":"2011","author":"Bernstein","year":"2011"},{"key":"ref27","article-title":"Xchacha: extended-nonce chacha and aead_xchacha20_poly1305","author":"Arciszewski","year":"2020","journal-title":"Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-xchacha-03"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9106"},{"key":"ref29","first-page":"arXiv:2201.02089","article-title":"A survey of json-compatible binary serialization specifications","author":"Cruz Viotti","year":"2022","journal-title":"arXiv e-prints"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"article-title":"Private routing - veilid","volume-title":"Veilid Foundation Inc","year":"2023","key":"ref31"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679374.pdf?arnumber=10679374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:57:10Z","timestamp":1727240230000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679374","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}