{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:16:44Z","timestamp":1730305004246,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/wf-iot.2018.8355230","type":"proceedings-article","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T21:25:21Z","timestamp":1525814721000},"page":"80-85","source":"Crossref","is-referenced-by-count":15,"title":["Securing the mobile edge through named data networking"],"prefix":"10.1109","author":[{"given":"Marica","family":"Amadeo","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Campolo","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Molinaro","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Rottondi","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Verticale","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_16"},{"journal-title":"Security Analysis of IKE's Signature-Based Key-Exchange Protocol","year":"2002","author":"canetti","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2597850"},{"key":"ref3","article-title":"Named data networking (NDN) project","author":"zhang","year":"2010","journal-title":"Xerox Palo Alto Research Center-PARC Tech Rep NDN-0001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7520967"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3098208.3098210"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660144"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2590099"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 20122017 Cisco White Paper","year":"2017","key":"ref1"},{"key":"ref9","article-title":"On the computation offloading at ad hoc cloudlet: architecture and service modes","volume":"53","author":"chen","year":"2015","journal-title":"IEEE Communications Magazine"}],"event":{"name":"2018 IEEE 4th World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2018,2,5]]},"location":"Singapore","end":{"date-parts":[[2018,2,8]]}},"container-title":["2018 IEEE 4th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8353083\/8355082\/08355230.pdf?arnumber=8355230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T18:54:23Z","timestamp":1527879263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8355230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2018.8355230","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}