{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:11:37Z","timestamp":1725721897859},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406323","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:09:23Z","timestamp":1531177763000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Peer-to-peer secure updates for heterogeneous edge devices"],"prefix":"10.1109","author":[{"given":"Herry","family":"Herry","sequence":"first","affiliation":[]},{"given":"Emily","family":"Band","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Perkins","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Singer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DHT Protocol","year":"2008","author":"loewenstern","key":"ref10"},{"journal-title":"The BitTorrent Protocol Specification","year":"2008","author":"cohen","key":"ref11"},{"journal-title":"Torrent Signing","year":"2012","author":"brown","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6886"},{"journal-title":"Windows update delivery optimization and privacy","year":"2017","key":"ref14"},{"journal-title":"Deploy updates using Windows Update for Business","year":"2017","author":"halfin","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061996"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC.2016.50"},{"journal-title":"peer-npm","year":"2017","author":"whitmore","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297243"},{"journal-title":"Serf Decentralized cluster membership failure detection and orchestration","year":"2017","key":"ref4"},{"journal-title":"Learning Ansible use Ansible to configure your systems deploy software and orchestrate advanced IT tasks","year":"2014","author":"mohaan","key":"ref3"},{"key":"ref6","article-title":"ICE: A protocol for NAT traversal for offer\/answer protocols","author":"rosenberg","year":"2010","journal-title":"IETF"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5389"},{"key":"ref8","article-title":"Peer-to-peer communication across network address translators","author":"ford","year":"2005","journal-title":"Proc USENIX Annual Technical Conference"},{"journal-title":"apt-p2p-apt helper for peer-to-peer downloads of debian packages","year":"2017","author":"dale","key":"ref7"},{"journal-title":"Chef Infrastructure Automation Cookbook","year":"2013","author":"marschall","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/396\/4\/042027"},{"journal-title":"Transmission","year":"0","key":"ref9"},{"key":"ref20","article-title":"The asymptotic configuration of application components in a distributed system","author":"pollock","year":"1998","journal-title":"Technical Report"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2018,4,23]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406323.pdf?arnumber=8406323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:34:53Z","timestamp":1643214893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406323","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}