{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:38:06Z","timestamp":1730277486470,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/itc.2014.6932977","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T05:10:36Z","timestamp":1414818636000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Security considerations in OpenTag network"],"prefix":"10.1109","author":[{"given":"Hamid","family":"Farhadi","sequence":"first","affiliation":[]},{"given":"Ryoji","family":"Furuhashi","sequence":"additional","affiliation":[]},{"given":"Akihiro","family":"Nakao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"304","article-title":"Mitigating some security attacks in mpls-vpn model","volume":"5","author":"raman","year":"2012","journal-title":"\" \" International Journal on Advances in Networks and Services"},{"journal-title":"Analyzing MPLS VPN Security Cisco Press","year":"0","author":"michael","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.08.002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1397718.1397726"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544032"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963588"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"journal-title":"Google Losing Up to $1 65M A Day on YouTube","year":"0","author":"evolution","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544084"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544085"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"journal-title":"OCTEON Plus MIPS64 Many-core Network Processors","year":"0","key":"4"},{"key":"9","article-title":"Distributed implementation of coordinated, network-wide policies and protocols with flowflex","author":"mundada","year":"2010","journal-title":"CC Technical Report GT-CS-10-07"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"}],"event":{"name":"2014 26th International Teletraffic Congress (ITC)","start":{"date-parts":[[2014,9,9]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,9,11]]}},"container-title":["2014 26th International Teletraffic Congress (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6919807\/6932926\/06932977.pdf?arnumber=6932977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:35:09Z","timestamp":1490308509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6932977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/itc.2014.6932977","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}