메뉴 건너뛰기




Volumn 10, Issue 2, 2015, Pages 308-320

LIVE: Lightweight integrity verification and content access control for named data networking

Author keywords

access control; data security; Next generation networking

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; INTERNET PROTOCOLS; NETWORK ARCHITECTURE; NETWORK SECURITY; NEXT GENERATION NETWORKS; SECURITY OF DATA;

EID: 84921416301     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2365742     Document Type: Article
Times cited : (83)

References (30)
  • 2
  • 3
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle, "A digital signature based on a conventional encryption function," in Proc. CRYPTO, 1987, pp. 369-378.
    • (1987) Proc. CRYPTO , pp. 369-378
    • Merkle, R.C.1
  • 4
    • 85180543368 scopus 로고    scopus 로고
    • Efficient protocols for signing routing messages
    • K. Zhang, "Efficient protocols for signing routing messages," in Proc. NDSS, 1998, pp. 1-7.
    • (1998) Proc. NDSS , pp. 1-7
    • Zhang, K.1
  • 6
    • 85010823713 scopus 로고    scopus 로고
    • ANDaNA: Anonymous named data networking application
    • [Online] Available
    • S. DiBenedetto, P. Gasti, G. Tsudik, and E. Uzun, "ANDaNA: Anonymous named data networking application," in Proc. NDSS, 2012. [Online] Available: http://www.internetsociety.org/andana-anonymousnamed-data-networking-application
    • (2012) Proc. NDSS
    • Dibenedetto, S.1    Gasti, P.2    Tsudik, G.3    Uzun, E.4
  • 8
    • 84921400491 scopus 로고    scopus 로고
    • CAPS: A confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks
    • Berlin, Germany: Springer-Verlag
    • A. K. Maji and S. Bagchi, "CAPS: A confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks," in Security and Privacy in Communication Networks. Berlin, Germany: Springer-Verlag, 2011.
    • (2011) Security and Privacy in Communication Networks
    • Maji, A.K.1    Bagchi, S.2
  • 9
    • 84864055603 scopus 로고    scopus 로고
    • Efficient privacy preserving content based publish subscribe systems
    • M. Nabeel, N. Shang, and E. Bertino, "Efficient privacy preserving content based publish subscribe systems," in Proc. 7th ACM SACMAT, 2012, pp. 133-144.
    • (2012) Proc. 7th ACM SACMAT , pp. 133-144
    • Nabeel, M.1    Shang, N.2    Bertino, E.3
  • 10
    • 36948999539 scopus 로고    scopus 로고
    • To peer or not to peer: Modeling the evolution of the internet's as-level topology
    • H. Chang, S. Jamin, and W. Willinger, "To peer or not to peer: Modeling the evolution of the internet's as-level topology," in Proc. 25th IEEE INFOCOM, Apr. 2006, pp. 1-12.
    • (2006) Proc. 25th IEEE INFOCOM, Apr. , pp. 1-12
    • Chang, H.1    Jamin, S.2    Willinger, W.3
  • 11
    • 0024664205 scopus 로고
    • A secure identity-based capability system
    • May
    • L. Gong, "A secure identity-based capability system," in Proc. IEEE Symp. Secur. Privacy, May 1989, pp. 56-63.
    • (1989) Proc. IEEE Symp. Secur. Privacy , pp. 56-63
    • Gong, L.1
  • 15
    • 84921400490 scopus 로고    scopus 로고
    • Securing BGP and SIDR
    • [Online]. Available
    • G. Huston and R. Bush, "Securing BGP and SIDR," IETF J., vol. 7, no. 1, 2011. [Online]. Available: http://www.internetsociety. org/articles/securing-bgp-and-sidr
    • (2011) IETF J. , vol.7 , Issue.1
    • Huston, G.1    Bush, R.2
  • 16
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. CCS, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 17
    • 84921400489 scopus 로고    scopus 로고
    • Online]. Available
    • The OpenSSL Project. [Online]. Available: http://www.openssl.org/
  • 20
    • 84877935151 scopus 로고    scopus 로고
    • Protecting access privacy of cached contents in information centric networks
    • A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, and Y. Kim, "Protecting access privacy of cached contents in information centric networks," in Proc. 8th ACM ASIACCS, 2013, pp. 173-178.
    • (2013) Proc. 8th ACM ASIACCS , pp. 173-178
    • Mohaisen, A.1    Zhang, X.2    Schuchard, M.3    Xie, H.4    Kim, Y.5
  • 23
    • 84901503736 scopus 로고    scopus 로고
    • Check before storing: What is the performance price of content integrity verification in LRU caching?
    • G. Bianchi, A. Detti, A. Caponi, and N. Blefari-Melazzi, "Check before storing: What is the performance price of content integrity verification in LRU caching?" ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 3, pp. 59-67, 2013.
    • (2013) ACM SIGCOMM Comput. Commun. Rev. , vol.43 , Issue.3 , pp. 59-67
    • Bianchi, G.1    Detti, A.2    Caponi, A.3    Blefari-Melazzi, N.4
  • 24
    • 84904093275 scopus 로고    scopus 로고
    • On the interplay among naming, content validity and caching in information centric networks
    • Dec.
    • A. Detti, A. Caponi, G. Tropea, G. Bianchi, and N. Blefari-Melazzi, "On the interplay among naming, content validity and caching in information centric networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 2108-2113.
    • (2013) Proc. IEEE GLOBECOM , pp. 2108-2113
    • Detti, A.1    Caponi, A.2    Tropea, G.3    Bianchi, G.4    Blefari-Melazzi, N.5
  • 26
    • 39749157863 scopus 로고    scopus 로고
    • Pollution attacks and defenses for internet caching systems
    • L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic, "Pollution attacks and defenses for internet caching systems," Comput. Netw., vol. 52, no. 5, pp. 935-956, 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.5 , pp. 935-956
    • Deng, L.1    Gao, Y.2    Chen, Y.3    Kuzmanovic, A.4
  • 27
    • 84886396936 scopus 로고    scopus 로고
    • A lightweight mechanism for detection of cache pollution attacks in named data networking
    • M. Conti, P. Gasti, and M. Teoli, "A lightweight mechanism for detection of cache pollution attacks in named data networking," Comput. Netw., vol. 57, no. 16, pp. 3178-3191, 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.16 , pp. 3178-3191
    • Conti, M.1    Gasti, P.2    Teoli, M.3
  • 28
    • 84898024191 scopus 로고    scopus 로고
    • Poseidon: Mitigating interest flooding DDoS attacks in named data networking
    • Oct.
    • A. Compagno, M. Conti, P. Gasti, and G. Tsudik, "Poseidon: Mitigating interest flooding DDoS attacks in named data networking," in Proc. IEEE 38th Conf. LCN, Oct. 2013, pp. 630-638.
    • (2013) Proc. IEEE 38th Conf. LCN , pp. 630-638
    • Compagno, A.1    Conti, M.2    Gasti, P.3    Tsudik, G.4
  • 30
    • 36949039907 scopus 로고    scopus 로고
    • A data-oriented (and beyond) network architecture
    • T. Koponen et al., "A data-oriented (and beyond) network architecture," in Proc. SIGCOMM, 2007, pp. 181-192.
    • (2007) Proc. SIGCOMM , pp. 181-192
    • Koponen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.