{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:09Z","timestamp":1750220349320,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3409934.3409943","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T14:43:26Z","timestamp":1598366606000},"page":"51-58","source":"Crossref","is-referenced-by-count":0,"title":["Proof of Data Distribution Based on Trusted Hardware"],"prefix":"10.1145","author":[{"given":"Batnyam","family":"Enkhtaivan","sequence":"first","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]},{"given":"Pooja","family":"Dhomse","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ghana Almashaqbeh. 2019. Ph.D. https:\/\/doi.org\/10.7916\/d8-kmv2-7n57.  Ghana Almashaqbeh. 2019. Ph.D. https:\/\/doi.org\/10.7916\/d8-kmv2-7n57."},{"key":"e_1_3_2_1_2_1","unstructured":"Ghada Almashaqbeh Kevin Kelley Allison Bishop and Justin Cappos. 2019. CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. CoRRabs\/1906.10272 (2019). arXiv: 1906.1027 https:\/\/arxiv.org\/abs\/1906.10272.  Ghada Almashaqbeh Kevin Kelley Allison Bishop and Justin Cappos. 2019. CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. CoRRabs\/1906.10272 (2019). arXiv: 1906.1027 https:\/\/arxiv.org\/abs\/1906.10272."},{"volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134092"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_5_1"},{"volume-title":"26th Annual Symposium on Foundations of Computer Science (sfcs1985)","author":"Cohen J. D.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Intel Corporation. 2016. Intel 64 and IA-32 Architectures Software Developer's Manual.  Intel Corporation. 2016. Intel 64 and IA-32 Architectures Software Developer's Manual."},{"volume-title":"Retrieved","year":"2016","author":"Intel Corporation","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"volume-title":"Retrieved","year":"2018","author":"DAC.","key":"e_1_3_2_1_10_1"},{"volume-title":"Retrieved","year":"2015","author":"E.","key":"e_1_3_2_1_11_1"},{"volume-title":"Retrieved","year":"2017","author":"Devadutta","key":"e_1_3_2_1_12_1"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_13_1"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_14_1"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Prateesh Goyal Ravi Netravali Mohammad Alizadeh and Hari Balakrishnan. 2018. Secure Incentivization for Decentralized Content Delivery. CoRR abs\/1808.00826 (2018). arXiv: 1808.00826 http:\/\/arxiv.org\/abs\/1808.00826.  Prateesh Goyal Ravi Netravali Mohammad Alizadeh and Hari Balakrishnan. 2018. Secure Incentivization for Decentralized Content Delivery. CoRR abs\/1808.00826 (2018). arXiv: 1808.00826 http:\/\/arxiv.org\/abs\/1808.00826."},{"volume-title":"Trust-Enhanced Content Deliver in Blockchain-Based Information-Centric Networking. Retrieved","year":"2020","author":"Miyazaki T.","key":"e_1_3_2_1_17_1"},{"volume-title":"Retrieved","year":"2017","author":"Harnik Danny","key":"e_1_3_2_1_18_1"},{"volume-title":"Retrieved","year":"2020","author":"Herbaut N.","key":"e_1_3_2_1_19_1"},{"volume-title":"Retrieved","year":"2019","author":"IPFS.","key":"e_1_3_2_1_20_1"},{"volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)","year":"2019","author":"Kocher Paul","key":"e_1_3_2_1_21_1"},{"volume-title":"Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","year":"2019","author":"Kr\u00f3l Michal","key":"e_1_3_2_1_22_1"},{"volume-title":"Retrieved","year":"2017","author":"Labs Protocol","key":"e_1_3_2_1_23_1"},{"volume-title":"Retrieved","year":"2019","author":"Lage Oscar","key":"e_1_3_2_1_24_1"},{"volume-title":"27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"Lipp Moritz","key":"e_1_3_2_1_25_1"},{"volume-title":"Retrieved","year":"2020","author":"Ur M. H.","key":"e_1_3_2_1_26_1"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","year":"2009","author":"Nakamoto Satoshi","key":"e_1_3_2_1_27_1"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_28_1"},{"volume-title":"Blockchain-based Content Delivery Networks: Content Transparency Meets User Privacy. In 2019 IEEE Wireless Communications and Networking Conference (WCNC). 1--6.","author":"Vu T. X.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"}],"event":{"name":"IECC 2020: 2020 2nd International Electronics Communication Conference","acronym":"IECC 2020","location":"Singapore Singapore"},"container-title":["Proceedings of the 2020 2nd International Electronics Communication Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409934.3409943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:08Z","timestamp":1750191428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409934.3409943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":30,"alternative-id":["10.1145\/3409934.3409943","10.1145\/3409934"],"URL":"https:\/\/doi.org\/10.1145\/3409934.3409943","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]}}}