{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:06Z","timestamp":1750307046734,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342371","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"83-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Signposts"],"prefix":"10.1145","author":[{"given":"Amir","family":"Chaudhry","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Anil","family":"Madhavapeddy","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Charalampos","family":"Rotsos","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[{"name":"University of Nottingham, Nottingham, United Kingdom"}]},{"given":"Andrius","family":"Aucinas","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Jon","family":"Crowcroft","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Sebastian Probst","family":"Eide","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Steven","family":"Hand","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Andrew W.","family":"Moore","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Narseo","family":"Vallina-Rodriguez","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IETF","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , D. Massey , and S. Rose . DNS Security Introduction and Requirements. RFC 4033 , IETF , March 2005 . R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. DNS Security Introduction and Requirements. RFC 4033, IETF, March 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2060451"},{"key":"e_1_3_2_1_3_1","volume-title":"IETF","author":"Carpenter B.","year":"2002","unstructured":"B. Carpenter and S. Brim . Middleboxes: Taxonomy and Issues. RFC 3234 , IETF , February 2002 . B. Carpenter and S. Brim. Middleboxes: Taxonomy and Issues. RFC 3234, IETF, February 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"},{"key":"e_1_3_2_1_7_1","volume-title":"IETF","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain names -- concepts and facilities. RFC 1034 , IETF , November 1987 . P. Mockapetris. Domain names -- concepts and facilities. RFC 1034, IETF, November 1987."}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Helsinki Finland","acronym":"SIGCOMM '12"},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:01Z","timestamp":1750238461000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342371"}},"subtitle":["end-to-end networking in a world of middleboxes"],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":6,"alternative-id":["10.1145\/2342356.2342371","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342371","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}