{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:19:20Z","timestamp":1763468360296,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/lanman.2016.7548855","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T16:59:06Z","timestamp":1472144346000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Name-based push\/pull message dissemination for disaster message board"],"prefix":"10.1109","author":[{"given":"Atsushi","family":"Tagami","sequence":"first","affiliation":[]},{"given":"Tomohiko","family":"Yagyu","sequence":"additional","affiliation":[]},{"given":"Kohei","family":"Sugiyama","sequence":"additional","affiliation":[]},{"given":"Mayutan","family":"Arumaithurai","sequence":"additional","affiliation":[]},{"given":"Kenichi","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Hasegawa","sequence":"additional","affiliation":[]},{"given":"Tohru","family":"Asami","sequence":"additional","affiliation":[]},{"given":"K. K.","family":"Ramakrishnan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"rfc4838","article-title":"Delay Tolerant Network Architecture","author":"cerf","year":"2007","journal-title":"IETF Network Working Group"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/863956.863960"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2500501"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970723"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2542095.2542108"},{"key":"ref15","first-page":"377","article-title":"CEDO: Content-centric Dissemination Algorithm for Delay-tolerant Networks","author":"neves","year":"2013","journal-title":"Proc of ACM Conference on Modeling Analysis & Simulation of Wireless and Mobile Systems ser MSWiM"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849271"},{"journal-title":"ITU-T Focus Group on Disaster Relief Systems Network Resilience and Recovery (FG-DR&NRR) Std","article-title":"Requirements for Disaster Relief System","year":"2014","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.27"},{"key":"ref19","article-title":"Name-based Information Dissemination for Fragmented Networks in Disasters","author":"sugiyama","year":"2015","journal-title":"IEEE\/ACM Conference on Communication Systems & NETworkS ser COMSNETS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6843231"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414086"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2812609"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2009.5429249"},{"key":"ref2","article-title":"Using ICN in Disaster Scenarios","author":"seedorf","year":"2015","journal-title":"IRTF ICNRG Std"},{"journal-title":"ITU-T Focus Group on Disaster Relief Systems Network Resilience and Recovery (FG-DR&NRR) Std","article-title":"Technical Report on Telecommunications and Disaster Mitigation","year":"2013","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/2660129.2660131","article-title":"Reliable Contents Retrieval in Fragmented ICNs for Disaster Scenario","author":"yagyu","year":"2014","journal-title":"Proc of 1st ACM Conference on Information-Centric Networking ser ICN"},{"key":"ref22","article-title":"Internet Message Format","author":"resnick","year":"2008","journal-title":"IETF Network Working Group"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810163"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","article-title":"Identity-Based Cryptosystems and Signature Schemes","volume":"196","author":"chamir","year":"1985","journal-title":"Advances in Cryptology Ser Lecture Notes in Computer Science"}],"event":{"name":"2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","start":{"date-parts":[[2016,6,13]]},"location":"Rome, Italy","end":{"date-parts":[[2016,6,15]]}},"container-title":["2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7541907\/7548833\/07548855.pdf?arnumber=7548855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T22:02:01Z","timestamp":1657144921000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7548855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/lanman.2016.7548855","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}