-
1
-
-
84863804608
-
A survey of information-centric networking
-
BengtAhlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, BörjeOhlman: A survey of information-centric networking. IEEE Communications Magazine 50(7): 26-36 (2012).
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.7
, pp. 26-36
-
-
Ahlgren, B.1
Dannewitz, C.2
Imbrenda, C.3
Kutscher, D.4
Ohlman, B.5
-
3
-
-
36949039907
-
A Data-Oriented (And Beyond) Network Architecture
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, I. Stoica, A Data-Oriented (And Beyond) Network Architecture. ACM Sigcomm 2007.
-
ACM Sigcomm 2007
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
4
-
-
84856037017
-
Networking named content
-
V. Jacobson, D.K. Smetters, J.D. Thornton, M. Plass, N. Briggs, and R. Braynard. Networking named content. Communications of the ACM, 55(1):117-124, 2012.
-
(2012)
Communications of the ACM
, vol.55
, Issue.1
, pp. 117-124
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.4
Briggs, N.5
Braynard, R.6
-
5
-
-
80052504558
-
-
Technical report, PARC, Tech. report ndn- 0001
-
L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos, et al. Named data networking (ndn) project. Technical report, PARC, Tech. report ndn- 0001, 2010.
-
(2010)
Named Data Networking (Ndn) Project
-
-
Zhang, L.1
Estrin, D.2
Burke, J.3
Jacobson, V.4
Thornton, J.D.5
Smetters, D.K.6
Zhang, B.7
Tsudik, G.8
Massey, D.9
Papadopoulos, C.10
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. Advances in CryptologyCRYPTO 2001, pages 213-229. Springer, 2001.
-
(2001)
Advances in CryptologyCRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
76749083002
-
Networking named content
-
ACM
-
V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard. Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies, pages 1-12. ACM, 2009.
-
(2009)
Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies
, pp. 1-12
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
11
-
-
83455179466
-
Xia: An architecture for an evolvable and trustworthy internet
-
ACM
-
A. Anand, F. Dogar, D. Han, B. Li, H. Lim, M. Machado, W. Wu, A. Akella, D.G. Andersen, J.W. Byers, et al. Xia: an architecture for an evolvable and trustworthy internet. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, page 2. ACM, 2011.
-
(2011)
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
, pp. 2
-
-
Anand, A.1
Dogar, F.2
Han, D.3
Li, B.4
Lim, H.5
Machado, M.6
Wu, W.7
Akella, A.8
Andersen, D.G.9
Byers, J.W.10
-
12
-
-
84861671843
-
-
White Paper
-
T. Anderson, K. Birman, R. Broberg, M. Caesar, D. Comer, C. Cotton, M. Freedman, A. Haeberlen, Z. Ives, A. Krishnamurthy, et al. Nebula-a future internet that supports trustworthy cloud computing. White Paper, 2010.
-
(2010)
Nebula-a Future Internet That Supports Trustworthy Cloud Computing
-
-
Anderson, T.1
Birman, K.2
Broberg, R.3
Caesar, M.4
Comer, D.5
Cotton, C.6
Freedman, M.7
Haeberlen, A.8
Ives, Z.9
Krishnamurthy, A.10
-
14
-
-
0004115865
-
-
RFC 2560 (Proposed Standard), June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560 (Proposed Standard), June 1999.
-
(1999)
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
15
-
-
84874742021
-
DoS and DDoS in Named-Data Networking
-
abs/1208.0952
-
Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang: DoS and DDoS in Named-Data Networking CoRR abs/1208.0952: (2012).
-
(2012)
CoRR
-
-
Gasti, P.1
Tsudik, G.2
Uzun, E.3
Zhang, L.4
-
16
-
-
80052997396
-
Naming in content-oriented architectures
-
A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker. Naming in content-oriented architectures. In Proc of SIGCOMM Workshop on ICN, 2011.
-
Proc of SIGCOMM Workshop on ICN, 2011
-
-
Ghodsi, A.1
Koponen, T.2
Rajahalme, J.3
Sarolahti, P.4
Shenker, S.5
-
18
-
-
77952802757
-
Tibc: Trade-off between identity-based and certificateless cryptography for future internet
-
IEEE
-
A. Ahmad, A. Biri, H. Afifi, and D. Zeghlache. Tibc: Trade-off between identity-based and certificateless cryptography for future internet. In Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium on, pages 2866-2870. IEEE, 2009.
-
(2009)
Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium on
, pp. 2866-2870
-
-
Ahmad, A.1
Biri, A.2
Afifi, H.3
Zeghlache, D.4
-
21
-
-
67650233907
-
Hierarchical identity based cryptography for end-to-end security in dtns
-
IEEE
-
R. Patra, S. Surana, and S. Nedevschi. Hierarchical identity based cryptography for end-to-end security in dtns. In Intelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on, pages 223-230. IEEE, 2008.
-
(2008)
Intelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on
, pp. 223-230
-
-
Patra, R.1
Surana, S.2
Nedevschi, S.3
-
22
-
-
84055178945
-
Towards name-based trust and security for content-centric network
-
Xinwen Zhang, Katharine Chang, HuijunXiong, Yonggang Wen, Guangyu Shi, Guoqiang Wang: Towards name-based trust and security for content-centric network. ICNP 2011: 1-6.
-
ICNP 2011
, pp. 1-6
-
-
Zhang, X.1
Chang, K.2
Xiong, H.3
Wen, Y.4
Shi, G.5
Wang, G.6
|