{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:23:11Z","timestamp":1777490591006,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1145\/1658939.1658941","type":"proceedings-article","created":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T19:26:20Z","timestamp":1259695580000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3059,"title":["Networking named content"],"prefix":"10.1145","author":[{"given":"Van","family":"Jacobson","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, USA"}]},{"given":"Diana K.","family":"Smetters","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, USA"}]},{"given":"James D.","family":"Thornton","sequence":"additional","affiliation":[{"name":"Palo Alto Reseach Center, Palo Alto, USA"}]},{"given":"Michael F.","family":"Plass","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, USA"}]},{"given":"Nicholas H.","family":"Briggs","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, USA"}]},{"given":"Rebecca L.","family":"Braynard","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sep.","author":"Project","year":"2009","unstructured":"Project CCNxTM. http:\/\/www.ccnx.org , Sep. 2009 . Project CCNxTM. http:\/\/www.ccnx.org, Sep. 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/353677.353678"},{"key":"e_1_3_2_1_3_1","first-page":"5401","article-title":"Multicast Negative-Acknowledgement (NACK) Building Blocks","author":"Adamson B.","year":"2008","unstructured":"B. Adamson , C. Bormann , M. Handley , and J. Macker . Multicast Negative-Acknowledgement (NACK) Building Blocks . IETF , November 2008 . RFC 5401 . B. Adamson, C. Bormann, M. Handley, and J. Macker. Multicast Negative-Acknowledgement (NACK) Building Blocks. IETF, November 2008. RFC 5401.","journal-title":"IETF"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/319344.319164"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159955"},{"key":"e_1_3_2_1_8_1","volume-title":"Jan","author":"Cheriton D.","year":"2000","unstructured":"D. Cheriton and M. Gritter . TRIAD: A New Next-Generation Internet Architecture , Jan 2000 . D. Cheriton and M. Gritter. TRIAD: A New Next-Generation Internet Architecture, Jan 2000."},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","volume-title":"Freenet: A Distributed Anonymous Information Storage and Retrieval System","author":"Clarke I.","year":"2009","unstructured":"I. Clarke , O. Sandberg , B. Wiley , and T. W. Hong . Freenet: A Distributed Anonymous Information Storage and Retrieval System . Lecture Notes in Computer Science , 2009 : 46, 2001. I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. Lecture Notes in Computer Science, 2009:46, 2001."},{"key":"e_1_3_2_1_10_1","first-page":"C2693","author":"Ellison C. M.","year":"1999","unstructured":"C. M. Ellison , B. Frantz , B. Lampson , R. Rivest , B. M. Thomas , and T. Ylonen . SPKI Certificate Theory , September 1999 . RF C2693 . C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory, September 1999. RFC2693.","journal-title":"SPKI Certificate Theory"},{"key":"e_1_3_2_1_11_1","volume-title":"Delay- and Disruption-Tolerant Networking","author":"Farrell S.","year":"2006","unstructured":"S. Farrell and V. Cahill . Delay- and Disruption-Tolerant Networking . Artech House Publishers , 2006 . S. Farrell and V. Cahill. Delay- and Disruption-Tolerant Networking. Artech House Publishers, 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"e_1_3_2_1_13_1","volume-title":"IDC - The Expanding Digital Universe: A Forecast of Worldwide Inform ation Growth Through","author":"Gantz J. F.","year":"2010","unstructured":"J. F. Gantz IDC - The Expanding Digital Universe: A Forecast of Worldwide Inform ation Growth Through 2010 . Technical report, March 2007. J. F. Gantz et al. IDC - The Expanding Digital Universe: A Forecast of Worldwide Inform ation Growth Through 2010. Technical report, March 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"The Internet Society","author":"Gulbrandsen A.","year":"2000","unstructured":"A. Gulbrandsen , P. Vixie , and L. Esibov . A DNS RR for specifying the location of services (DNS SRV). IETF - Network Working Group , The Internet Society , February 2000 . RFC 2782. A. Gulbrandsen, P. Vixie, and L. Esibov. A DNS RR for specifying the location of services (DNS SRV). IETF - Network Working Group, The Internet Society, February 2000. RFC 2782."},{"key":"e_1_3_2_1_15_1","volume-title":"The Internet Society","author":"Guttman E.","year":"1999","unstructured":"E. Guttman , C. Perkins , J. Veizades , and M. Day . Service Location Protocol. IETF - Network Working Group , The Internet Society , June 1999 . RFC 2608. E. Guttman, C.Perkins, J. Veizades, and M. Day. Service Location Protocol. IETF - Network Working Group, The Internet Society, June 1999. RFC 2608."},{"key":"e_1_3_2_1_16_1","unstructured":"IETF. RFC 2328 -- OSPF Version 2.  IETF. RFC 2328 -- OSPF Version 2."},{"key":"e_1_3_2_1_17_1","unstructured":"IETF. RFC 3787 -- Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS).  IETF. RFC 3787 -- Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS)."},{"key":"e_1_3_2_1_18_1","unstructured":"IETF. RFC 4971 -- Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information.  IETF. RFC 4971 -- Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information."},{"key":"e_1_3_2_1_19_1","unstructured":"IETF. RFC 5250 -- The OSPF Opaque LSA Option.  IETF. RFC 5250 -- The OSPF Opaque LSA Option."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_3_2_1_21_1","volume-title":"The Internet Society","author":"Jacobson V.","year":"1992","unstructured":"V. Jacobson , R. Braden , and D. Borman . TCP Extensions for High Performance. IETF - Network Working Group , The Internet Society , May 1992 . RFC 1323. V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. IETF - Network Working Group, The Internet Society, May 1992. RFC 1323."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402961"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357007"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4423"},{"key":"e_1_3_2_1_29_1","volume-title":"April","author":"B. Ohlman","year":"2009","unstructured":"B. Ohlman et al. First NetInf architecture description , April 2009 . http:\/\/www.4ward-project.eu\/index.php?s=file_download&id=39. B. Ohlman et al. First NetInf architecture description, April 2009. http:\/\/www.4ward-project.eu\/index.php?s=file_download&id=39."},{"key":"e_1_3_2_1_30_1","volume-title":"HOTSEC","author":"Osterweil E.","year":"2006","unstructured":"E. Osterweil , D. Massey , B. Tsendjav , B. Zhang , and L. Zhang . Security Through Publicity . In HOTSEC , 2006 . E. Osterweil, D. Massey, B. Tsendjav, B. Zhang, and L. Zhang. Security Through Publicity. In HOTSEC, 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.395"},{"key":"e_1_3_2_1_32_1","volume-title":"MIT","author":"Rivest R. L.","year":"1996","unstructured":"R. L. Rivest and B. Lampson . SDSI - A Simple Distributed Security Infrastructure. Technical report , MIT , 1996 . R. L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. Technical report, MIT, 1996."},{"key":"e_1_3_2_1_33_1","volume-title":"ICT-MobileSummit","author":"S\u00e4rel\u00e4 M.","year":"2008","unstructured":"M. S\u00e4rel\u00e4 , T. Rinta-aho, and S. Tarkoma . RTFM: Publish\/Subscribe Internetworking Architecture . In ICT-MobileSummit , 2008 . M. S\u00e4rel\u00e4, T. Rinta-aho, and S. Tarkoma. RTFM: Publish\/Subscribe Internetworking Architecture. In ICT-MobileSummit, 2008."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX","author":"Wendlandt D.","year":"2008","unstructured":"D. Wendlandt , D. Andersen , and A. Perrig . Perspectives: Improving SSH-style host authentication with multi-path probing . In USENIX , 2008 . D. Wendlandt, D. Andersen, and A. Perrig. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX, 2008."}],"event":{"name":"Co-NEXT '09: Conference on emerging Networking EXperiments and Technologies","location":"Rome Italy","acronym":"Co-NEXT '09","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 5th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658939.1658941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1658939.1658941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:02Z","timestamp":1750250462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658939.1658941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":35,"alternative-id":["10.1145\/1658939.1658941","10.1145\/1658939"],"URL":"https:\/\/doi.org\/10.1145\/1658939.1658941","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2009-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}