{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T03:52:07Z","timestamp":1725421927162},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/iccnc.2014.6785470","type":"proceedings-article","created":{"date-parts":[[2014,4,17]],"date-time":"2014-04-17T14:04:24Z","timestamp":1397743464000},"page":"977-981","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Peer-to-Peer DNS"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Sancho","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Lopes Pereira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1591"},{"journal-title":"Homeland Security's Domain Seizures Worries Congress","year":"2012","author":"kerr","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2011.6030613"},{"journal-title":"A Wave of the Watch List and Speech Disappears","year":"2008","author":"liptak","key":"1"},{"key":"7","first-page":"155","article-title":"Serving dns using a peerto-peer lookup service","author":"cox","year":"2002","journal-title":"Revised Papers from the First International Workshop on Peer-to-Peer Systems Ser IPTPS '01"},{"key":"6","first-page":"53","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2001","journal-title":"Revised Papers from the First International Workshop on Peer-to-Peer Systems Ser IPTPS '01"},{"key":"5","first-page":"93","article-title":"Building in big brother","author":"zimmermann","year":"1995","journal-title":"Pretty Good Privacy Public Key Encryption for the Masses"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52338"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680131"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5952823"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021268306761"}],"event":{"name":"2014 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2014,2,3]]},"location":"Honolulu, HI","end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6778476\/6785290\/06785470.pdf?arnumber=6785470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T12:35:28Z","timestamp":1490272528000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6785470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2014.6785470","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}