{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:38:38Z","timestamp":1729669118025,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/isads.2013.6513423","type":"proceedings-article","created":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T21:39:38Z","timestamp":1368221978000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Supervisor application for content management in named data networking"],"prefix":"10.1109","author":[{"given":"Kei","family":"Kusunoki","sequence":"first","affiliation":[]},{"given":"Yoshihiro","family":"Kawahara","sequence":"additional","affiliation":[]},{"given":"Tohru","family":"Asami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/el:19941076"},{"journal-title":"The Official PGP User's Guide","year":"1995","author":"zimmermann","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2008.02.041"},{"key":"ref5","first-page":"1270","article-title":"An Approach to Reduce Illegal Content Redistributions of P2P Video Sharing System Using Multiple Secret Sharing Scheme","volume":"94","author":"kusunoki","year":"2011","journal-title":"The transactions of the Institute of Electronics Information and Communication Engineers B"},{"key":"ref8","article-title":"SDSI &#x2013; a Simple Distributed Security Infrastructure","author":"rivest","year":"1996","journal-title":"Tech rep MIT Tech Rep"},{"key":"ref7","article-title":"X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCS","author":"myers","year":"1999","journal-title":"P Technical Report RFC2560"},{"key":"ref2","article-title":"Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"cooper","year":"2008","journal-title":"Technical Report RFC"},{"key":"ref9","article-title":"SPKI Certificate Theory","author":"rivest","year":"1999","journal-title":"Technical Report RFC"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-1998-61-202","article-title":"On SDSI's Linked Local Name Spaces","volume":"6","author":"abadi","year":"1998","journal-title":"Journal of Computer Security"}],"event":{"name":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2013,3,6]]},"location":"Mexico City, Mexico","end":{"date-parts":[[2013,3,8]]}},"container-title":["2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6510013\/6513393\/06513423.pdf?arnumber=6513423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T17:29:46Z","timestamp":1563038986000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6513423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isads.2013.6513423","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}