-
1
-
-
84856037017
-
Networking named content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. Plass, N. Briggs, and R. Braynard, "Networking named content," Commun. ACM, vol. 55, no. 1, pp. 117-124, 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.1
, pp. 117-124
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.4
Briggs, N.5
Braynard, R.6
-
2
-
-
84866603373
-
Access control enforcement delegation for information-centric networking architectures
-
N. Fotiou, G. F. Marias, and G. C. Polyzos, "Access control enforcement delegation for information-centric networking architectures," in Proc. ACM SIGCOMM Workshop Inf.-Centric Netw., 2012, pp. 85-90.
-
(2012)
Proc. ACM SIGCOMM Workshop Inf.-Centric Netw.
, pp. 85-90
-
-
Fotiou, N.1
Marias, G.F.2
Polyzos, G.C.3
-
3
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
R. C. Merkle, "A digital signature based on a conventional encryption function," in Proc. CRYPTO, 1987, pp. 369-378.
-
(1987)
Proc. CRYPTO
, pp. 369-378
-
-
Merkle, R.C.1
-
4
-
-
85180543368
-
Efficient protocols for signing routing messages
-
K. Zhang, "Efficient protocols for signing routing messages," in Proc. NDSS, 1998, pp. 1-7.
-
(1998)
Proc. NDSS
, pp. 1-7
-
-
Zhang, K.1
-
6
-
-
85010823713
-
ANDaNA: Anonymous named data networking application
-
[Online] Available
-
S. DiBenedetto, P. Gasti, G. Tsudik, and E. Uzun, "ANDaNA: Anonymous named data networking application," in Proc. NDSS, 2012. [Online] Available: http://www.internetsociety.org/andana-anonymousnamed-data-networking-application
-
(2012)
Proc. NDSS
-
-
Dibenedetto, S.1
Gasti, P.2
Tsudik, G.3
Uzun, E.4
-
7
-
-
84891417880
-
DoS and DDoS in named data networking
-
P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, "DoS and DDoS in named data networking," in Proc. ICCCN, 2013, pp. 1-7.
-
(2013)
Proc. ICCCN
, pp. 1-7
-
-
Gasti, P.1
Tsudik, G.2
Uzun, E.3
Zhang, L.4
-
8
-
-
84921400491
-
CAPS: A confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks
-
Berlin, Germany: Springer-Verlag
-
A. K. Maji and S. Bagchi, "CAPS: A confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks," in Security and Privacy in Communication Networks. Berlin, Germany: Springer-Verlag, 2011.
-
(2011)
Security and Privacy in Communication Networks
-
-
Maji, A.K.1
Bagchi, S.2
-
9
-
-
84864055603
-
Efficient privacy preserving content based publish subscribe systems
-
M. Nabeel, N. Shang, and E. Bertino, "Efficient privacy preserving content based publish subscribe systems," in Proc. 7th ACM SACMAT, 2012, pp. 133-144.
-
(2012)
Proc. 7th ACM SACMAT
, pp. 133-144
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
10
-
-
36948999539
-
To peer or not to peer: Modeling the evolution of the internet's as-level topology
-
H. Chang, S. Jamin, and W. Willinger, "To peer or not to peer: Modeling the evolution of the internet's as-level topology," in Proc. 25th IEEE INFOCOM, Apr. 2006, pp. 1-12.
-
(2006)
Proc. 25th IEEE INFOCOM, Apr.
, pp. 1-12
-
-
Chang, H.1
Jamin, S.2
Willinger, W.3
-
11
-
-
0024664205
-
A secure identity-based capability system
-
May
-
L. Gong, "A secure identity-based capability system," in Proc. IEEE Symp. Secur. Privacy, May 1989, pp. 56-63.
-
(1989)
Proc. IEEE Symp. Secur. Privacy
, pp. 56-63
-
-
Gong, L.1
-
12
-
-
0001421170
-
EROS: A fast capability system
-
J. S. Shapiro, J. M. Smith, and D. J. Farber, "EROS: A fast capability system," in Proc. 17th ACM SOSP, 1999, pp. 170-185.
-
(1999)
Proc. 17th ACM SOSP
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
14
-
-
80051959854
-
SCION: Scalability, control, and isolation on nextgeneration networks
-
May
-
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen, "SCION: Scalability, control, and isolation on nextgeneration networks," in Proc. IEEE Symp. Secur. Privacy, May 2011, pp. 212-227.
-
(2011)
Proc. IEEE Symp. Secur. Privacy
, pp. 212-227
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
Chan, H.4
Perrig, A.5
Andersen, D.G.6
-
15
-
-
84921400490
-
Securing BGP and SIDR
-
[Online]. Available
-
G. Huston and R. Bush, "Securing BGP and SIDR," IETF J., vol. 7, no. 1, 2011. [Online]. Available: http://www.internetsociety. org/articles/securing-bgp-and-sidr
-
(2011)
IETF J.
, vol.7
, Issue.1
-
-
Huston, G.1
Bush, R.2
-
16
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. CCS, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
84921400489
-
-
Online]. Available
-
The OpenSSL Project. [Online]. Available: http://www.openssl.org/
-
-
-
-
18
-
-
84055200941
-
Network fault localization with small TCB
-
Oct
-
X. Zhang, Z. Zhou, G. Hasker, A. Perrig, and V. Gligor, "Network fault localization with small TCB," in Proc. 19th IEEE ICNP, Oct. 2011, pp. 143-154.
-
(2011)
Proc. 19th IEEE ICNP
, pp. 143-154
-
-
Zhang, X.1
Zhou, Z.2
Hasker, G.3
Perrig, A.4
Gligor, V.5
-
19
-
-
84890852576
-
Interest flooding attack and countermeasures in named data networking
-
May
-
A. Afanasyev, P. Mahadevany, I. Moiseenko, E. Uzuny, and L. Zhang, "Interest flooding attack and countermeasures in named data networking," in Proc. IFIP Netw. Conf, May 2013, pp. 1-9.
-
(2013)
Proc. IFIP Netw. Conf
, pp. 1-9
-
-
Afanasyev, A.1
Mahadevany, P.2
Moiseenko, I.3
Uzuny, E.4
Zhang, L.5
-
20
-
-
84877935151
-
Protecting access privacy of cached contents in information centric networks
-
A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, and Y. Kim, "Protecting access privacy of cached contents in information centric networks," in Proc. 8th ACM ASIACCS, 2013, pp. 173-178.
-
(2013)
Proc. 8th ACM ASIACCS
, pp. 173-178
-
-
Mohaisen, A.1
Zhang, X.2
Schuchard, M.3
Xie, H.4
Kim, Y.5
-
21
-
-
84893245457
-
Cache privacy in named-data networking
-
Jul.
-
G. Acs, M. Conti, P. Gasti, C. Ghali, and G. Tsudik, "Cache privacy in named-data networking," in Proc. IEEE 33rd ICDCS, Jul. 2013, pp. 41-51.
-
(2013)
Proc. IEEE 33rd ICDCS
, pp. 41-51
-
-
Acs, G.1
Conti, M.2
Gasti, P.3
Ghali, C.4
Tsudik, G.5
-
22
-
-
84872698091
-
Privacy risks in named data networking: What is the cost of performance?
-
Sep
-
T. Lauinger, N. Laoutaris, P. Rodriguez, T. Strufe, E. Biersack, and E. Kirda, "Privacy risks in named data networking: What is the cost of performance?" ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 5, pp. 54-57, Sep. 2012.
-
(2012)
ACM SIGCOMM Comput. Commun. Rev.
, vol.42
, Issue.5
, pp. 54-57
-
-
Lauinger, T.1
Laoutaris, N.2
Rodriguez, P.3
Strufe, T.4
Biersack, E.5
Kirda, E.6
-
23
-
-
84901503736
-
Check before storing: What is the performance price of content integrity verification in LRU caching?
-
G. Bianchi, A. Detti, A. Caponi, and N. Blefari-Melazzi, "Check before storing: What is the performance price of content integrity verification in LRU caching?" ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 3, pp. 59-67, 2013.
-
(2013)
ACM SIGCOMM Comput. Commun. Rev.
, vol.43
, Issue.3
, pp. 59-67
-
-
Bianchi, G.1
Detti, A.2
Caponi, A.3
Blefari-Melazzi, N.4
-
24
-
-
84904093275
-
On the interplay among naming, content validity and caching in information centric networks
-
Dec.
-
A. Detti, A. Caponi, G. Tropea, G. Bianchi, and N. Blefari-Melazzi, "On the interplay among naming, content validity and caching in information centric networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 2108-2113.
-
(2013)
Proc. IEEE GLOBECOM
, pp. 2108-2113
-
-
Detti, A.1
Caponi, A.2
Tropea, G.3
Bianchi, G.4
Blefari-Melazzi, N.5
-
25
-
-
84883475711
-
A semantic firewall for content-centric networking
-
May
-
D. Goergen, T. Cholez, J. Francois, and T. Engel, "A semantic firewall for content-centric networking," in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM), May 2013, pp. 478-484.
-
(2013)
Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM)
, pp. 478-484
-
-
Goergen, D.1
Cholez, T.2
Francois, J.3
Engel, T.4
-
26
-
-
39749157863
-
Pollution attacks and defenses for internet caching systems
-
L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic, "Pollution attacks and defenses for internet caching systems," Comput. Netw., vol. 52, no. 5, pp. 935-956, 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.5
, pp. 935-956
-
-
Deng, L.1
Gao, Y.2
Chen, Y.3
Kuzmanovic, A.4
-
27
-
-
84886396936
-
A lightweight mechanism for detection of cache pollution attacks in named data networking
-
M. Conti, P. Gasti, and M. Teoli, "A lightweight mechanism for detection of cache pollution attacks in named data networking," Comput. Netw., vol. 57, no. 16, pp. 3178-3191, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.16
, pp. 3178-3191
-
-
Conti, M.1
Gasti, P.2
Teoli, M.3
-
28
-
-
84898024191
-
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
-
Oct.
-
A. Compagno, M. Conti, P. Gasti, and G. Tsudik, "Poseidon: Mitigating interest flooding DDoS attacks in named data networking," in Proc. IEEE 38th Conf. LCN, Oct. 2013, pp. 630-638.
-
(2013)
Proc. IEEE 38th Conf. LCN
, pp. 630-638
-
-
Compagno, A.1
Conti, M.2
Gasti, P.3
Tsudik, G.4
-
29
-
-
80053032069
-
On preserving privacy in content-oriented networks
-
S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker, "On preserving privacy in content-oriented networks," in Proc. ACM SIGCOMM Workshop Inf.-Centric Netw., 2011, pp. 19-24.
-
(2011)
Proc. ACM SIGCOMM Workshop Inf.-Centric Netw.
, pp. 19-24
-
-
Arianfar, S.1
Koponen, T.2
Raghavan, B.3
Shenker, S.4
-
30
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
T. Koponen et al., "A data-oriented (and beyond) network architecture," in Proc. SIGCOMM, 2007, pp. 181-192.
-
(2007)
Proc. SIGCOMM
, pp. 181-192
-
-
Koponen, T.1
|