{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:09:44Z","timestamp":1729663784276,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/worldcis.2013.6751012","type":"proceedings-article","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T21:13:02Z","timestamp":1398892382000},"page":"25-29","source":"Crossref","is-referenced-by-count":0,"title":["Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL"],"prefix":"10.1109","author":[{"family":"Ting Zhang","sequence":"first","affiliation":[]},{"given":"Dale","family":"Lindskog","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2010.30"},{"key":"2","first-page":"23","article-title":"Rofl: Routing as the firewall layer","author":"zhao","year":"2009","journal-title":"Proceedings of the 2008 New Security Paradigms Workshop"},{"year":"0","key":"10"},{"key":"1","first-page":"37","article-title":"Distributed tirewalls","volume":"24","author":"bellovin","year":"1999","journal-title":"Journal of Login"},{"key":"7","first-page":"877","article-title":"Bloom filters via d-left hashing and dynamic bit reassignment extended abstract","author":"bonomi","year":"2006","journal-title":"FortyFourth Annual Allerton Conf"},{"key":"6","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/1151659.1159950","article-title":"Beyond bloom filters: From approximate membership checks to approximate state machines","author":"bonomi","year":"2006","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916641"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465564"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261978"},{"key":"8","article-title":"A variable length counting bloom filter","author":"li","year":"2010","journal-title":"Computer Engineering and Technology (ICCET) 2010 2nd International Conference on"}],"event":{"name":"2013 World Congress on Internet Security (WorldCIS)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["World Congress on Internet Security (WorldCIS-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745499\/6750999\/06751012.pdf?arnumber=6751012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T12:27:08Z","timestamp":1498134428000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6751012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/worldcis.2013.6751012","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}