{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:49:46Z","timestamp":1729644586075,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/icccn.2009.5235378","type":"proceedings-article","created":{"date-parts":[[2009,9,11]],"date-time":"2009-09-11T15:26:15Z","timestamp":1252682775000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["ODON: An On-Demand Security Overlay for Mission-Critical Applications"],"prefix":"10.1109","author":[{"given":"Jinu","family":"Kurian","sequence":"first","affiliation":[]},{"given":"Ajay","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Hai Trong","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Kamil","family":"Sarac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Mission-Critical Network Planning","year":"2003","author":"liotine","key":"3"},{"key":"2","article-title":"odon: an on-demand overlay network for mission critical applications","author":"kurian","year":"2008","journal-title":"Univeristy of Texas at Dallas Tech Rep"},{"key":"10","article-title":"verifying security protocols: an application of csp","author":"schneider","year":"2004","journal-title":"Proceedings of 25 Years of CSP"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3689"},{"journal-title":"Communicating Sequential Processes","year":"2004","author":"hoare","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"5","article-title":"improving the reliability of internet paths with one-hop source routing","author":"gummadi","year":"2004","journal-title":"Proceedings of 6th USENIX Symposium on Operating Systems Design and Implementaion (OSDI)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/E88-B.1.397"},{"key":"8","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","article-title":"breaking and fixing the needham-schroeder public-key protocol using csp and fdr","volume":"1055","author":"love","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"The Internet under Crisis Conditions Learning from September 11","year":"2003","key":"11"}],"event":{"name":"2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009","start":{"date-parts":[[2009,8,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2009,8,6]]}},"container-title":["2009 Proceedings of 18th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5235208\/5235209\/05235378.pdf?arnumber=5235378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:38:48Z","timestamp":1497814728000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5235378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icccn.2009.5235378","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}