{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:15:50Z","timestamp":1769804150800,"version":"3.49.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1109\/nfv-sdn66355.2025.11349541","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:18:47Z","timestamp":1769721527000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Mobile Devices as Dynamic Compute Nodes in Cloud-Native Edge Networks"],"prefix":"10.1109","author":[{"given":"Apostolis K.","family":"Salkintzis","sequence":"first","affiliation":[{"name":"Lenovo Research"}]},{"given":"Filippos","family":"Balasis","sequence":"additional","affiliation":[{"name":"Lenovo Research"}]},{"given":"Nikolaos","family":"Petropouleas","sequence":"additional","affiliation":[{"name":"Lenovo Research"}]},{"given":"Dimitrios","family":"Dimopoulos","sequence":"additional","affiliation":[{"name":"Lenovo Research"}]}],"member":"263","reference":[{"key":"ref1","article-title":"ETSI GS MEC 003 V4.1.1. Multi-access Edge Computing (MEC); Framework and Reference Architecture","year":"2025","journal-title":"ETSI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/camad62243.2024.10942889"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2989456"},{"key":"ref4","article-title":"Security Architecture and Procedures for 5G System","year":"2022","journal-title":"v17.5.0"},{"key":"ref5","article-title":"Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)","year":"2024","journal-title":"v18.3.0"},{"key":"ref6","article-title":"Architecture for Enabling Edge Applications","year":"2022","journal-title":"v17.4.0"},{"key":"ref8","article-title":"System architecture for the 5G System (5GS); Stage 2; (Release 18)","year":"2024","journal-title":"v18.5.0"},{"key":"ref9","article-title":"Procedures for the 5G System (5GS); Stage 2; (Release 18)","year":"2024","journal-title":"v18.5.0"}],"event":{"name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","location":"Athens, Greece","start":{"date-parts":[[2025,11,10]]},"end":{"date-parts":[[2025,11,12]]}},"container-title":["2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11349354\/11349357\/11349541.pdf?arnumber=11349541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:02:24Z","timestamp":1769756544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11349541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn66355.2025.11349541","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]}}}