{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:05:49Z","timestamp":1725771949946},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/uic-atc.2017.8397416","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T22:34:27Z","timestamp":1530225267000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Opportunities and challenges for named data networking to increase the agility of military coalitions"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Gibson","sequence":"first","affiliation":[]},{"given":"Pablo","family":"Bermell-Garcia","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Bongjun","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Afanasyev","sequence":"additional","affiliation":[]},{"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/2810156.2810170","article-title":"Schematizing trust in Named Data Networking","author":"yu","year":"2015","journal-title":"Proceedings of ACM Information Centric Networking Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940518"},{"journal-title":"Online","article-title":"NSF\/Intel Partnership on Information-Centric Networking in Wireless Edge Networks (lCN-WEN)","year":"2016","key":"ref10"},{"key":"ref6","article-title":"Name-based access control","author":"yu","year":"2016","journal-title":"NDN Tech Report NDN-0034"},{"journal-title":"Signed Interest","year":"2016","key":"ref5"},{"journal-title":"NDN Tech Rep NDN-0022","article-title":"Ndn technical memo: Naming conventions","year":"2014","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.920975"},{"journal-title":"Online","article-title":"Sharing Battlefield Information at Multiple Classification Levels via Mobile Handheld Devices","year":"2017","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"}],"event":{"name":"2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2017,8,4]]},"location":"San Francisco, CA","end":{"date-parts":[[2017,8,8]]}},"container-title":["2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8386711\/8397387\/08397416.pdf?arnumber=8397416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:28:01Z","timestamp":1643207281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8397416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/uic-atc.2017.8397416","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}