Identity Based Approach Under a Unified Service Model for Secure Content Distribution in ICN
暂无分享,去创建一个
[1] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[2] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[3] Yonggang Wen,et al. Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.
[4] Suyong Eum,et al. Information-Centric Networking (ICN) Research Challenges , 2016, RFC.
[5] Satyajayant Misra,et al. Secure content delivery in information-centric networks: design, implementation, and analyses , 2013, ICN '13.
[6] Ping Wang,et al. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..
[7] Christopher A. Wood,et al. Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[8] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[9] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[10] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..
[11] Lixia Zhang. Name-Based Access Control , 2015 .
[12] Lixia Zhang,et al. Securing building management systems using named data networking , 2014, IEEE Network.
[13] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[14] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[15] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.