{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T09:34:57Z","timestamp":1760866497859,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:00:00Z","timestamp":1702339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,12]]},"DOI":"10.1145\/3630590.3630598","type":"proceedings-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T12:04:36Z","timestamp":1702382676000},"page":"62-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cornerstone: Automating Remote NDN Entity Bootstrapping"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6722-1938","authenticated-orcid":false,"given":"Tianyuan","family":"Yu","sequence":"first","affiliation":[{"name":"UCLA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7575-1058","authenticated-orcid":false,"given":"Xinyu","family":"Ma","sequence":"additional","affiliation":[{"name":"UCLA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1178-9521","authenticated-orcid":false,"given":"Hongcheng","family":"Xie","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-9916","authenticated-orcid":false,"given":"Dirk","family":"Kutscher","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (GZ), China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-757X","authenticated-orcid":false,"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[{"name":"UCLA, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599682"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Richard Barnes Jacob Hoffman-Andrews Daniel McCarney and James Kasten. 2019. Automatic Certificate Management Environment (ACME). RFC 8555. https:\/\/doi.org\/10.17487\/RFC8555","DOI":"10.17487\/RFC8555"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Sharon Boeyen Stefan Santesson Tim Polk Russ Housley Stephen Farrell and David Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"e_1_3_2_1_5_1","volume-title":"The Design Philosophy of the DARPA Internet Protocols. In Symposium Proceedings on Communications Architectures and Protocols(SIGCOMM \u201988)","author":"Clark David","year":"1988","unstructured":"David Clark. 1988. The Design Philosophy of the DARPA Internet Protocols. In Symposium Proceedings on Communications Architectures and Protocols(SIGCOMM \u201988). Association for Computing Machinery."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517212.3558091"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357402"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Paul\u00a0E. Hoffman. 2023. DNS Security Extensions (DNSSEC). RFC 9364. https:\/\/doi.org\/10.17487\/RFC9364","DOI":"10.17487\/RFC9364"},{"key":"e_1_3_2_1_9_1","volume-title":"Network Named Content. CoNEXT","author":"Jacobson Van","year":"2009","unstructured":"Van Jacobson, Diana\u00a0K Smetters, JD Thronton, Michael\u00a0F Plass, Nicholas\u00a0H Briggs, and RL Braynard. 2009. Network Named Content. CoNEXT (2009)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800789"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488663.3493690"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487813"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482972"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839088"},{"key":"e_1_3_2_1_15_1","volume-title":"Hydra\u2013A Federated Data Repository over NDN. arXiv preprint arXiv:2211.00919","author":"Presley Justin","year":"2022","unstructured":"Justin Presley, Xi Wang, Tym Brandel, Xusheng Ai, Proyash Podder, Tianyuan Yu, Varun Patil, Lixia Zhang, Alex Afanasyev, F\u00a0Alex Feltus, 2022. Hydra\u2013A Federated Data Repository over NDN. arXiv preprint arXiv:2211.00919 (2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"NDNViber: Vibration-Assisted Automated Bootstrapping of IoT Devices. In 2020 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1\u20136.","author":"Ramani Sanjeev\u00a0Kaushik","year":"2020","unstructured":"Sanjeev\u00a0Kaushik Ramani, Proyash Podder, and Alex Afanasyev. 2020. NDNViber: Vibration-Assisted Automated Bootstrapping of IoT Devices. In 2020 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1\u20136."},{"key":"e_1_3_2_1_17_1","unstructured":"N. Sakimura J. Bradley M.B. Jones B. de Medeiros and C. Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. https:\/\/openid.net\/specs\/openid-connect-core-1_0.html"},{"key":"e_1_3_2_1_18_1","unstructured":"NDN\u00a0Project Team. 2023. python-ndn documentation. https:\/\/python-ndn.readthedocs.io\/en\/latest\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Enabling Plug-n-Play in Named Data Networking. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 562\u2013569","author":"Yu Tianyuan","year":"2021","unstructured":"Tianyuan Yu, Philipp Moll, Zhiyi Zhang, Alexander Afanasyev, and Lixia Zhang. 2021. Enabling Plug-n-Play in Named Data Networking. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 562\u2013569."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276799.3276804"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3132090"},{"key":"e_1_3_2_1_23_1","volume-title":"On Certificate Management in Named Data Networking. arXiv preprint arXiv:2009.09339","author":"Zhang Zhiyi","year":"2020","unstructured":"Zhiyi Zhang, Su\u00a0Yong Wong, Junxiao Shi, Davide Pesavento, Alexander Afanasyev, and Lixia Zhang. 2020. On Certificate Management in Named Data Networking. arXiv preprint arXiv:2009.09339 (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700846"}],"event":{"name":"AINTEC '23: Asian Internet Engineering Conference","acronym":"AINTEC '23","location":"Hanoi Vietnam"},"container-title":["Proceedings of the 18th Asian Internet Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630590.3630598","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630590.3630598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:13:05Z","timestamp":1755972785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630590.3630598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,12]]},"references-count":24,"alternative-id":["10.1145\/3630590.3630598","10.1145\/3630590"],"URL":"https:\/\/doi.org\/10.1145\/3630590.3630598","relation":{},"subject":[],"published":{"date-parts":[[2023,12,12]]},"assertion":[{"value":"2023-12-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}