{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:48Z","timestamp":1750306488568,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,30]],"date-time":"2015-09-30T00:00:00Z","timestamp":1443571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Institute of Information and Communications Technology","award":["167"],"award-info":[{"award-number":["167"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,30]]},"DOI":"10.1145\/2810156.2810163","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"157-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Moderator-Controlled Information Sharing by Identity-Based Aggregate Signatures for Information Centric Networking"],"prefix":"10.1145","author":[{"given":"Tohru","family":"Asami","sequence":"first","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]},{"given":"Byambajav","family":"Namsraijav","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]},{"given":"Yoshihiko","family":"Kawahara","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]},{"given":"Kohei","family":"Sugiyama","sequence":"additional","affiliation":[{"name":"KDDI R&amp;D Laboratories, Fujimino, Japan"}]},{"given":"Atsushi","family":"Tagami","sequence":"additional","affiliation":[{"name":"KDDI R&amp;D Laboratories, Fujimino, Japan"}]},{"given":"Tomohiko","family":"Yagyu","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kawasaki, Japan"}]},{"given":"Kenichi","family":"Nakamura","sequence":"additional","affiliation":[{"name":"Panasonic Corporation, Tokyo, Japan"}]},{"given":"Toru","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"Osaka University, Osaka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2015,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"June","author":"Alphabets PP.","year":"1996","unstructured":"3G PP. Alphabets and language-specific information. Technical Specification Group Terminals 23.038i version 2.0.0 , June 1996 . 3GPP. Alphabets and language-specific information. Technical Specification Group Terminals 23.038i version 2.0.0, June 1996."},{"key":"e_1_3_2_1_2_1","unstructured":"D. Barr. Majordomo. http:\/\/www.greatcircle.com\/majordomo\/FAQ.html. Accessed: 2015-05-04.  D. Barr. Majordomo. http:\/\/www.greatcircle.com\/majordomo\/FAQ.html. Accessed: 2015-05-04."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.27"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/648120.746918"},{"volume-title":"version: 5.6.1","author":"Dai W.","key":"e_1_3_2_1_8_1","unstructured":"W. Dai . Crypto+library , version: 5.6.1 . http:\/\/www.cryptopp.com\/. Accessed: 2015-05-04. W. Dai. Crypto+library, version: 5.6.1. http:\/\/www.cryptopp.com\/. Accessed: 2015-05-04."},{"key":"e_1_3_2_1_9_1","volume-title":"All Hazard Field Guide: A Responder's Handbook Using the National Incident Management System's Incident Command System. Amazon Services International","author":"Deal T.","year":"2011","unstructured":"T. Deal , C. Mills , and M. Deal . All Hazard Field Guide: A Responder's Handbook Using the National Incident Management System's Incident Command System. Amazon Services International , Inc ., 2011 . T. Deal, C. Mills, and M. Deal. All Hazard Field Guide: A Responder's Handbook Using the National Incident Management System's Incident Command System. Amazon Services International, Inc., 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"Phase 1)","author":"SI.","year":"1992","unstructured":"ET SI. Subscriber identity modules , functional characteristics. Recommendation GSM 02.17 version 3.2.9 (Release 92 , Phase 1) , February 1992 . ETSI. Subscriber identity modules, functional characteristics. Recommendation GSM 02.17 version 3.2.9 (Release 92, Phase 1), February 1992."},{"key":"e_1_3_2_1_11_1","unstructured":"Facebook. Controlling what you see in news feed. https:\/\/www.facebook.com\/help\/335291769884272\/ . Accessed: 2015-05-04.  Facebook. Controlling what you see in news feed. https:\/\/www.facebook.com\/help\/335291769884272\/ . Accessed: 2015-05-04."},{"key":"e_1_3_2_1_12_1","volume-title":"Ike and ikev2 authentication using the elliptic curve digital signature algorithm (ecdsa). RFC","author":"Fu D.","year":"2007","unstructured":"D. Fu and J. Solinas . Ike and ikev2 authentication using the elliptic curve digital signature algorithm (ecdsa). RFC 4754, January 2007 . D. Fu and J. Solinas. Ike and ikev2 authentication using the elliptic curve digital signature algorithm (ecdsa). RFC 4754, January 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_17"},{"key":"e_1_3_2_1_14_1","volume-title":"July","author":"Grigorik I.","year":"2012","unstructured":"I. Grigorik . Latency: The new web performance bottleneck. https:\/\/www.igvita.com\/2012\/07\/19\/latency-the-new-web-performance-bottleneck\/ , July 2012 . Accessed : 2015.02.02. I. Grigorik. Latency: The new web performance bottleneck. https:\/\/www.igvita.com\/2012\/07\/19\/latency-the-new-web-performance-bottleneck\/, July 2012. Accessed: 2015.02.02."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0850"},{"volume-title":"Early history of listserv","key":"e_1_3_2_1_16_1","unstructured":"L-Soft international. Early history of listserv . http:\/\/www.lsoft.com\/products\/listserv-history.asp. Accessed: 2015-05-04. L-Soft international. Early history of listserv. http:\/\/www.lsoft.com\/products\/listserv-history.asp. Accessed: 2015-05-04."},{"volume-title":"The pairing-based cryptography library, version: 0.5.14","author":"Lynn B.","key":"e_1_3_2_1_17_1","unstructured":"B. Lynn . The pairing-based cryptography library, version: 0.5.14 . http:\/\/crypto.stanford.edu\/pbc\/. Accessed: 2015-05-04. B. Lynn. The pairing-based cryptography library, version: 0.5.14. http:\/\/crypto.stanford.edu\/pbc\/. Accessed: 2015-05-04."},{"key":"e_1_3_2_1_18_1","unstructured":"S. Mastorakis. Ndn c+ library with experimental extensions. https:\/\/github.com\/named-data\/ndn-cxx. Accessed: 2014--12--22.  S. Mastorakis. Ndn c+ library with experimental extensions. https:\/\/github.com\/named-data\/ndn-cxx. Accessed: 2014--12--22."},{"key":"e_1_3_2_1_19_1","unstructured":"B. Namsraijav. Ndn-cxx fork with ibas support. https:\/\/github.com\/byambajav\/ndn-ibas\/. Accessed: 2015-05--17.  B. Namsraijav. Ndn-cxx fork with ibas support. https:\/\/github.com\/byambajav\/ndn-ibas\/. Accessed: 2015-05--17."},{"volume-title":"Ndn specification documentation","author":"Project Team NDN","key":"e_1_3_2_1_20_1","unstructured":"NDN Project Team . Ndn specification documentation . http:\/\/named-data.net\/wp-content\/uploads\/2013\/11\/packetformat.pdf. Accessed: 2015-08-05. NDN Project Team. Ndn specification documentation. http:\/\/named-data.net\/wp-content\/uploads\/2013\/11\/packetformat.pdf. Accessed: 2015-08-05."},{"key":"e_1_3_2_1_21_1","unstructured":"NDN Project Team. Type-length-value (tlv) encoding. http:\/\/named-data.net\/doc\/ndn-tlv\/tlv.html. Accessed: 2015-08-04.  NDN Project Team. Type-length-value (tlv) encoding. http:\/\/named-data.net\/doc\/ndn-tlv\/tlv.html. Accessed: 2015-08-04."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733631"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660130"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_25_1","volume-title":"Elliptic curve algorithm integration in the secure shell transport layer. RFC","author":"Stebila D.","year":"2009","unstructured":"D. Stebila and J. Green . Elliptic curve algorithm integration in the secure shell transport layer. RFC 5656, December 2009 . D. Stebila and J. Green. Elliptic curve algorithm integration in the secure shell transport layer. RFC 5656, December 2009."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660131"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_17"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089053"}],"event":{"name":"ICN'15: 2nd International Conference on Information-Centric Networking","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"San Francisco California USA","acronym":"ICN'15"},"container-title":["Proceedings of the 2nd ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810156.2810163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810156.2810163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:32Z","timestamp":1750225712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810156.2810163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,30]]},"references-count":28,"alternative-id":["10.1145\/2810156.2810163","10.1145\/2810156"],"URL":"https:\/\/doi.org\/10.1145\/2810156.2810163","relation":{},"subject":[],"published":{"date-parts":[[2015,9,30]]},"assertion":[{"value":"2015-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}