{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:23Z","timestamp":1750306163904,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935676","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"62-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key"],"prefix":"10.1145","author":[{"given":"Hongwei","family":"Meng","sequence":"first","affiliation":[{"name":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"}]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[{"name":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"}]},{"given":"Jianbin","family":"Hu","sequence":"additional","affiliation":[{"name":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"}]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[{"name":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education) and National Engineering Research Center of Software Engineering, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_3_2_1_2_1","volume-title":"Internet Protocol Made Accountable. Hotnets","author":"Yang X. W.","year":"2009","unstructured":"Yang , X. W. , Liu . X. 2009. Internet Protocol Made Accountable. Hotnets , 2009 , NY , USA. Yang, X. W., Liu. X. 2009. Internet Protocol Made Accountable. Hotnets, 2009, NY, USA."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_1_4_1","article-title":"A Survey of the Research on Future Internet Architectures","volume":"2011","author":"Pan J.","year":"2011","unstructured":"Pan , J. , Paul , S. , and Jain , R. 2011 . A Survey of the Research on Future Internet Architectures . IEEE Communications Magazine , 2011 , 49(7):26--36. Pan, J., Paul, S., and Jain, R. 2011. A Survey of the Research on Future Internet Architectures. IEEE Communications Magazine, 2011, 49(7):26--36.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=131248","author":"Next Phase","year":"2014","unstructured":"NSF FIA Next Phase . http:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=131248 , 2014 .5. NSF FIA Next Phase. http:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=131248, 2014.5."},{"key":"e_1_3_2_1_6_1","unstructured":"Named Data Networking.. http:\/\/www.named-data.net\/.  Named Data Networking.. http:\/\/www.named-data.net\/."},{"key":"e_1_3_2_1_7_1","unstructured":"MobilityFirst Future Internet Architecture Project. http:\/\/mobilityfirst.winlab.rutgers.edu\/.  MobilityFirst Future Internet Architecture Project. http:\/\/mobilityfirst.winlab.rutgers.edu\/."},{"key":"e_1_3_2_1_8_1","unstructured":"eXpressive Internet Architecture Project. 2014. http:\/\/www.cs.cmu.edu\/~xia\/.  eXpressive Internet Architecture Project. 2014. http:\/\/www.cs.cmu.edu\/~xia\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_3"},{"key":"e_1_3_2_1_10_1","volume-title":"P., Jokela, P. et al. Host Identity Protocol. RFC","author":"Moskowitz R.","year":"2008","unstructured":"Moskowitz , R. , Nikander , P., Jokela, P. et al. Host Identity Protocol. RFC 5201, April 2008 . Moskowitz, R., Nikander, P., Jokela, P. et al. Host Identity Protocol. RFC 5201, April 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656885"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849268"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614191"},{"key":"e_1_3_2_1_17_1","volume-title":"Protocol Modifications for the DNS Security Extensions. RFC 4035","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , D. Massey , and S. Rose . Protocol Modifications for the DNS Security Extensions. RFC 4035 , 2005 . R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. RFC 4035, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM'04)","author":"Tang W.","year":"2004","unstructured":"Tang , W. , Nan , X. H. and Chen , Z . 2004. Combined public key cryptosystem . Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM'04) , 2004 . Tang, W., Nan, X. H. and Chen, Z. 2004. Combined public key cryptosystem. Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM'04), 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_20_1","volume-title":"U.S. Department of Commerce","author":"National Institute of Standards and Technology, INST PUB 186","year":"1994","unstructured":"National Institute of Standards and Technology, INST PUB 186 , Digital Signature Standards , U.S. Department of Commerce 1994 . National Institute of Standards and Technology, INST PUB 186, Digital Signature Standards, U.S. Department of Commerce 1994."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_22_1","volume-title":"An Efficient CPK-based Key Management Scheme in Wireless Sensor Networks. 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE","author":"Zheng J.","year":"2015","unstructured":"Zheng , J. , Chen , Z. F. , Xue , J. R. , Wu , F. 2015 . An Efficient CPK-based Key Management Scheme in Wireless Sensor Networks. 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015). Zheng, J., Chen, Z. F., Xue, J. R., Wu, F. 2015. An Efficient CPK-based Key Management Scheme in Wireless Sensor Networks. 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015)."}],"event":{"name":"CFI '16: The 11th International Conference on Future Internet Technologies","sponsor":["AsiaFI Asia Future Internet"],"location":"Nanjing China","acronym":"CFI '16"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935676","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:56Z","timestamp":1750217996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935676"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":22,"alternative-id":["10.1145\/2935663.2935676","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935676","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}