{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:57:37Z","timestamp":1725811057711},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1719403"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652892","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"570-576","source":"Crossref","is-referenced-by-count":3,"title":["Investigating the Design Space for Name Confidentiality in Named Data Networking"],"prefix":"10.1109","author":[{"given":"Zhiyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Su Yong","family":"Won","sequence":"additional","affiliation":[]},{"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2018.090646"},{"journal-title":"Privacy in content-oriented networking Threats and countermeasures","year":"2013","author":"chaabane","key":"ref11"},{"key":"ref12","article-title":"A brief introduction to state vector sync","author":"moll","year":"2021","journal-title":"NDN Technical Report NDN-0073 Revision 2"},{"key":"ref13","article-title":"Ndn full packet security","author":"serban","year":"0","journal-title":"2019 named Data Networking Community Meeting"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3794"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810171"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125720"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC\/DSCI\/SmartCNS.2019.00166"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701147"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482971"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/QSHINE.2014.6928679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994639"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125723"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/fi12080130"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599774"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3276799.3276804"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSN48538.2019.00024"},{"journal-title":"ANDaNA Anonymous Named Data Networking Application","year":"2012","author":"dibenedetto","key":"ref20"},{"key":"ref22","first-page":"866","article-title":"A privacy-preserving approach in content centric","author":"seo","year":"2014","journal-title":"IEEE Consumer communications and Networking Conference (CCNC"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444924"},{"key":"ref24","article-title":"A survey of distributed dataset synchronization in named data networking","author":"moll","year":"2021","journal-title":"NDN Technical Report NDN-0053 Revision"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539428"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2764"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652892.pdf?arnumber=9652892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:03Z","timestamp":1652202003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652892","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}