{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:16:16Z","timestamp":1762431376589,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/wimob.2017.8115834","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:03:14Z","timestamp":1511474594000},"page":"324-333","source":"Crossref","is-referenced-by-count":4,"title":["CIDOR: Content distribution and retrieval in disaster networks for public protection"],"prefix":"10.1109","author":[{"given":"Hasan M A","family":"Islam","sequence":"first","affiliation":[]},{"given":"Dmitrij","family":"Lagutin","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Lukyanenko","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Yla-Jaaski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849270"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298166"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080602"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935157"},{"journal-title":"CCNx","year":"2009","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/863956.863960"},{"key":"ref13","article-title":"Adaptive content-based routing for delay-tolerant mobile ad hoc networks","author":"costa","year":"2006","journal-title":"Research Note RN\/10\/02 University College London"},{"key":"ref14","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"2000","journal-title":"Technical report Technical Report CS-200006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"key":"ref16","volume":"34","author":"jain","year":"2004","journal-title":"Routing in a Delay Tolerant Network"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330111"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859986"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2875951.2875959"},{"journal-title":"IP Over ICN the better IP? an unusual take on Information-Centric Networking","year":"2015","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970723"},{"key":"ref3","first-page":"102","article-title":"The publish\/subscribe internet routing paradigm (PSIRP): Designing the future internet architecture","author":"tarkoma","year":"2009","journal-title":"Towards the Future Internet"},{"journal-title":"Delay-tolerant networking architecture","year":"2007","author":"cerf","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849271"},{"key":"ref5","article-title":"Netinf: An information-centric design for the future internet","author":"dannewitz","year":"2009","journal-title":"Proc 3rd GI\/ITG KuVS Workshop on the Future Internet"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2507924.2507931"},{"journal-title":"Bundle protocol specification","year":"2007","author":"burleigh","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.163"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2011.6126671"},{"key":"ref21","first-page":"1","article-title":"Listen first, broadcast later: Topology-agnostic forwarding under high dynamics","author":"meisel","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.256"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720195"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145301"},{"key":"ref25","first-page":"1","article-title":"Secure content centric mobile network","author":"chuah","year":"0"}],"event":{"name":"2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2017,10,9]]},"location":"Rome","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106925\/8115727\/08115834.pdf?arnumber=8115834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:45:08Z","timestamp":1515451508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/wimob.2017.8115834","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}