{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:43:43Z","timestamp":1729619023831,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icc.2016.7511193","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:28:51Z","timestamp":1469564931000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["PROTECTOR: Privacy-preserving information lookup in content-centric networks"],"prefix":"10.1109","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[]},{"given":"Cesar","family":"Bernardini","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31","article-title":"Project ccnx"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590303"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.910"},{"key":"ref11","article-title":"Controle de acasso baseado em reencripta&#x00E7;&#x00E3;o por proxy em redes centradas em informa&#x00E7;&#x00E3;o","author":"mannes","year":"0","journal-title":"SBseg 2014"},{"key":"ref12","article-title":"Ac 3 n: Anonymous communication in content-centric networking","author":"tsudik","year":"0","journal-title":"IEEE CCNC 2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0415"},{"key":"ref14","article-title":"Proxy cryptography revisited","author":"anca-andreea","year":"0","journal-title":"NDSS 2003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06749-0_8"},{"article-title":"OSPFN: An OSPF based routing protocol for Named Data Networking","year":"2012","author":"wang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660141"},{"journal-title":"2013 IEEE ICDCS","article-title":"Cache privacy in named-data networking","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"ref28","article-title":"Attribute-based encryption for Iine-grained access control of encrypted data","author":"goyal","year":"0","journal-title":"ACM CCS 2006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","volume":"3027","author":"boneh","year":"2004","journal-title":"Proc of EURO-CRYPT 2004"},{"journal-title":"Developing Information Networking Further From PSIRP to PURSUIT","year":"0","author":"fotiou","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500102"},{"journal-title":"Strat&#x00E9;gies de cache bas&#x00E9;es sur la popularit&#x00E9; pour content centric networking","year":"2015","author":"bernardini","key":"ref7"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 2013&#x2013;2018","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810171"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 20092014","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721674"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"ref21","article-title":"Usable PIR","author":"williams","year":"2008","journal-title":"NDSS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref26","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"0","journal-title":"IEEE SSP 2000"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"}],"event":{"name":"ICC 2016 - 2016 IEEE International Conference on Communications","start":{"date-parts":[[2016,5,22]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2016,5,27]]}},"container-title":["2016 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502491\/7510595\/07511193.pdf?arnumber=7511193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:14:40Z","timestamp":1498331680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7511193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icc.2016.7511193","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}