{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:49:55Z","timestamp":1725612595872},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/wcsp.2014.6992077","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:10:51Z","timestamp":1419977451000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Copyright protection in named data networking"],"prefix":"10.1109","author":[{"given":"Xiaobin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Zifei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Cliff","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/CISW.2007.4425532"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/UBICOMM.2007.26"},{"key":"14","first-page":"662","article-title":"The design of soft man-based digital copyright protection system in internet","author":"you","year":"2008","journal-title":"Cybernetics and Intelligent Systems 2008 IEEE Conference on"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1658939.1658941"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/2500098.2500102"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/CAMAD.2012.6335307"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/2491224.2491228"},{"key":"1","article-title":"Cisco visual networking index: Forecast and methodology, 2013-2018","author":"cisco","year":"2014","journal-title":"CISCO White Paper 2013-2018"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ISQED.2009.4810350"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/DATE.2005.32"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/2342488.2342501"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/ICCCN.2013.6614132"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ICPADS.2012.84"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICDCSW.2007.40"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/IIT.2007.4430505"}],"event":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","start":{"date-parts":[[2014,10,23]]},"location":"Hefei, China","end":{"date-parts":[[2014,10,25]]}},"container-title":["2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6971896\/6992003\/06992077.pdf?arnumber=6992077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:17:56Z","timestamp":1602674276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6992077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2014.6992077","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}