{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:33:48Z","timestamp":1725456828690},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254005","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:54Z","timestamp":1516038654000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Towards Access Control for Network Coding-Based Named Data Networking"],"prefix":"10.1109","author":[{"given":"Danye","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yujun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810165"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761300"},{"key":"ref30","first-page":"1","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"IFIP Networking Conference"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0100"},{"key":"ref10","first-page":"1107","article-title":"Secure network coding-based named data network mutual anonymity communication protocol","author":"tao","year":"2015","journal-title":"Proceedings of International Conference on Electrical Computer Engineering and Electronics (ICECEE)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857127"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2248361.2248370"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145300"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491717"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2550437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052348"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366286"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref27","first-page":"2426","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"INFOCOM 2012 Proceedings IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524382"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2016.0054"},{"key":"ref2","article-title":"Named data networking (ndn) project","author":"zhang","year":"2010","journal-title":"Relat&#x00F3;rio T&#x00E9;cnico NDN-0001"},{"key":"ref9","article-title":"Information-centric networking with built-in network coding to achieve multisource transmission at network-layer","author":"liu","year":"2015","journal-title":"Computer Networks"},{"journal-title":"Cisco Visual Networking Index Forecast and Methodology 2015&#x2013;2020","year":"2016","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866842"},{"journal-title":"Rocketfuel maps","year":"0","key":"ref24"},{"key":"ref23","article-title":"ndnsim: Ndn simulator for ns-3","author":"afanasyev","year":"2012","journal-title":"Tech Rep"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810174"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365742"}],"event":{"name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254005.pdf?arnumber=8254005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T05:11:39Z","timestamp":1516943499000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254005","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}