{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:00Z","timestamp":1761401940610,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/ifipnetworking.2017.8264861","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T17:40:12Z","timestamp":1516642812000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Mobile sessions in content-centric networks"],"prefix":"10.23919","author":[{"given":"Marc","family":"Mosko","sequence":"first","affiliation":[]},{"given":"Ersin","family":"Uzun","sequence":"additional","affiliation":[]},{"given":"Christopher A.","family":"Wood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"File-Like ICN Collection (FLIC)","author":"wood","year":"2017","journal-title":"Internet Engineering Task Force Internet-Draft draft-tschudin-icnrg-flic-00"},{"journal-title":"Syn cookies","year":"1996","author":"bernstein","key":"ref32"},{"key":"ref31","article-title":"Using Transport Layer Security (TLS) to Secure QUIC","author":"thomson","year":"2017","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-quic-tls-02"},{"key":"ref30","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"canetti","year":"2001","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"journal-title":"CCNx distillery","year":"2016","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref12","article-title":"CCNx semantics","author":"mosko","year":"2016","journal-title":"IRTF Draft Palo Alto Research Center Inc"},{"key":"ref13","article-title":"CCNx access control specifications","author":"smetters","year":"2010","journal-title":"PARC Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491237"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940528"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145300"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1201\/b18772","article-title":"Name-based access control","author":"yu","year":"2015","journal-title":"Named Data Networking Project"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810174"},{"key":"ref28","article-title":"The crime attack","volume":"2012","author":"rizzo","year":"2012","journal-title":"Ekoparty Security Conference"},{"key":"ref4","article-title":"Quic: A udp-based secure and reliable transport for http\/2","author":"hamilton","year":"2016","journal-title":"IETF draft-tsvwg-quic-protocol-02"},{"key":"ref27","article-title":"CCNx Messages in TLV Format","author":"mosko","year":"2016","journal-title":"Internet Engineering Task Force Internet-Draft draft-irtf-icnrg-ccnxmessages-02"},{"key":"ref3","first-page":"13","article-title":"The Transport Layer Security (TLS) Protocol Version 1.3","author":"rescorla","year":"2016","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-tls-tls13-18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.18"},{"journal-title":"QUIC crypto","year":"2014","author":"langley","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994639"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996448"},{"key":"ref1","article-title":"Preventing side-channel leaks in web traffic: A formal approach","author":"backes","year":"2013","journal-title":"NDSS"},{"journal-title":"Ndn-ace Access control for constrained environments over named data networking","year":"0","author":"shang","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"journal-title":"Tech Rep","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5288"}],"event":{"name":"2017 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2017,6,12]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253906\/8264823\/08264861.pdf?arnumber=8264861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T13:33:49Z","timestamp":1570628029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8264861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2017.8264861","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}