{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:30:04Z","timestamp":1772303404097,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761297","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"606-613","source":"Crossref","is-referenced-by-count":57,"title":["SlickFlow: Resilient source routing in Data Center Networks unlocked by OpenFlow"],"prefix":"10.1109","author":[{"given":"Ramon Marques","family":"Ramos","sequence":"first","affiliation":[]},{"given":"Magnos","family":"Martinello","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Esteve Rothenberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"2013","journal-title":"SpiderOak Private Online Backup and Sharing"},{"key":"22","year":"2013","journal-title":"Wuala Secure Storage Service"},{"key":"17","year":"2013","journal-title":"PiCsMu Website Platform-independent Cloud Storage System for Multiple Usage"},{"key":"18","year":"2010","journal-title":"SalesForce Com The Leader of Customer Relationship Management (CRM) and Cloud Computing"},{"key":"15","year":"2013","journal-title":"OAuth Specification OAuth 2 0 Specification"},{"key":"16","year":"2013","journal-title":"Otixo All Your Cloud Files from a Single Login"},{"key":"13","article-title":"Bypassing cloud providers data validation to store arbitrary data. 13th ifip","author":"machado","year":"2013","journal-title":"IEEE International Symposium on Integrated Network Management (IM 2013"},{"key":"14","year":"2013"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.15"},{"key":"12","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","article-title":"A survey and comparison of peer-to-peer overlay network schemes","volume":"7","author":"lua","year":"2005","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"21","year":"2013","journal-title":"Wikipedia Megaupload"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575140"},{"key":"20","year":"2013","journal-title":"TomP2P Website A P2P-based High Performance Key-value Pair Storage Library"},{"key":"2","author":"armbrust","year":"2009","journal-title":"Above the Clouds A Berkeley View of Cloud Computing"},{"key":"1","year":"2013","journal-title":"Amazon Com Web Services Products and Services"},{"key":"10","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"7","year":"2013","journal-title":"ID3 Website ID3 Version 2 Standard"},{"key":"6","article-title":"Ietf: A universally unique identifier (uuid) urn namespace","year":"2005","journal-title":"RFC 4122"},{"key":"5","year":"2013","journal-title":"Google Corporate Google Products and Solutions"},{"key":"4","year":"2013","journal-title":"Dropbox Dropbox Service"},{"key":"9","article-title":"An overview of steganography for the computer forensics examiner","author":"kessler","year":"2004","journal-title":"Technical Report Gary Kessler Associates"},{"key":"8","year":"2013","journal-title":"JSON-RPC Website Specification A Light Weight Remote Procedure Call Protocol Specification 2 0"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","location":"Sydney, NSW","start":{"date-parts":[[2013,10,21]]},"end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761297.pdf?arnumber=6761297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:34:51Z","timestamp":1498109691000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761297","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}