{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:15Z","timestamp":1750220895864,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,24]]},"DOI":"10.1145\/3357150.3357417","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"171-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["NDNSSEC"],"prefix":"10.1145","author":[{"given":"Pouyan Fotouhi","family":"Tehrani","sequence":"first","affiliation":[{"name":"Weizenbaum Institute \/ Fraunhofer FOKUS"}]},{"given":"Luca","family":"Keidel","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Eric","family":"Osterweil","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Jochen H.","family":"Schiller","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"unstructured":"J.Day. 2007. Patterns in Network Architecture: A Return to Fundamentals. Pearson Education.  J.Day. 2007. Patterns in Network Architecture: A Return to Fundamentals. Pearson Education.","key":"e_1_3_2_1_2_1"},{"unstructured":"Robert Elz and Randy Bush. 1997. Clarifications to the DNS Specification. RFC 2181.  Robert Elz and Randy Bush. 1997. Clarifications to the DNS Specification. RFC 2181.","key":"e_1_3_2_1_3_1"},{"unstructured":"Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. Resource Records for the DNS Security Extensions. RFC 4034.  Scott Rose Matt Larson Dan Massey Rob Austein and Roy Arends. 2005. Resource Records for the DNS Security Extensions. RFC 4034.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/3357150.3357401"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2656877.2656887"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"ICN '19","name":"ICN '19: 6th ACM Conference on Information-Centric Networking","location":"Macao China"},"container-title":["Proceedings of the 6th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357150.3357417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:38Z","timestamp":1750203878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357417"}},"subtitle":["Namespace Management in NDN with DNSSEC"],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":5,"alternative-id":["10.1145\/3357150.3357417","10.1145\/3357150"],"URL":"https:\/\/doi.org\/10.1145\/3357150.3357417","relation":{},"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"2019-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}