{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:08:29Z","timestamp":1729609709210,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nca.2016.7778643","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:48:10Z","timestamp":1481593690000},"page":"367-374","source":"Crossref","is-referenced-by-count":0,"title":["To route or to secure: Tradeoffs in ICNs over MANETs"],"prefix":"10.1109","author":[{"given":"Hasanat","family":"Kazmi","sequence":"first","affiliation":[]},{"given":"Hasnain","family":"Lakhani","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Tahir","sequence":"additional","affiliation":[]},{"given":"Fareed","family":"Zaffar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"24th International Conference on the Theory and Applications of cryptographic Techniaues"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470676"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2010.04.035","article-title":"Privacy and confidentiality in context-based and epidemic forwarding","volume":"33","author":"shikfa","year":"2010","journal-title":"Computer Communications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1409985.1409988"},{"key":"ref14","article-title":"Security, privacy, and access control in Information-Centric Networking: A survey","author":"tourani","year":"2016","journal-title":"arXiv 1603 03409"},{"key":"ref15","article-title":"ICEMAN:A system for efficient, robust and secure situational awareness at the network edge","author":"wood","year":"2013","journal-title":"32nd IEEE Military Communications Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491237"},{"key":"ref3","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"2006","journal-title":"28th IEEE Symposium on Security and Privacy"},{"key":"ref6","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"30th International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145300"},{"key":"ref8","article-title":"CCN in tactical and emergency MANETs","author":"oh","year":"2010","journal-title":"3rd IFIP Wireless Davs Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref1","article-title":"Interest flooding attack and countermeasures in Named Data Networking","author":"alexander","year":"2013","journal-title":"12th IFIP Networking Conference"},{"key":"ref9","article-title":"Decentralized authorization and privacy-enhanced routing for ICNs","author":"raykova","year":"2015","journal-title":"31st Annual ComputerSecuritv Aoolications Conference"}],"event":{"name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2016,10,31]]},"location":"Cambridge, Boston, MA, USA","end":{"date-parts":[[2016,11,2]]}},"container-title":["2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764659\/7778571\/07778643.pdf?arnumber=7778643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:54:29Z","timestamp":1568638469000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/nca.2016.7778643","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}