{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:00:13Z","timestamp":1730282413931,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/menacomm46666.2019.8988556","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:46:23Z","timestamp":1581374783000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Mechanism for Copyright Protection under Information-Centric Networking"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Al-Darwbi","sequence":"first","affiliation":[]},{"given":"Louai","family":"Al-Awami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2010","key":"ref10","article-title":"Scalable and adaptive internet solutions (sail)"},{"year":"2010","key":"ref11","article-title":"Content mediator architecture for content-aware networks (comet)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2014.6992077"},{"key":"ref14","article-title":"Cryptographic hash functions: A survey","author":"bakhtiari","year":"1995","journal-title":"Citeseer Tech Rep"},{"key":"ref15","article-title":"Hashing for similarity search: A survey","author":"wang","year":"2014","journal-title":"arXiv preprint arXiv 1408 2927"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071612"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146866"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.01.001"},{"key":"ref8","article-title":"Architecture definition, component descriptions, and requirements","volume":"3","author":"trossen","year":"2009","journal-title":"Deliverable D2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_33"},{"article-title":"Infographic: Publishers are stepping up their battle against internet piracy","year":"0","author":"richter","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9346-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"ref22","first-page":"89","article-title":"A fuzzy hashing approach based on random sequences and hamming distance","author":"breitinger","year":"2012","journal-title":"Proc of the Conference on Digital Forensics Security and Law Association of Digital Forensics Security and Law"},{"article-title":"Lempel-ziv jaccard distance, an effective alternative to ssdeep and sdhash","year":"2017","author":"raff","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2013.18"}],"event":{"name":"2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)","start":{"date-parts":[[2019,11,19]]},"location":"Manama, Bahrain","end":{"date-parts":[[2019,11,21]]}},"container-title":["2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967516\/8988514\/08988556.pdf?arnumber=8988556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:25:27Z","timestamp":1658247927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8988556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/menacomm46666.2019.8988556","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}