Security and Privacy Issues of Implementing Cloud Computing on NDN
暂无分享,去创建一个
[1] Priya Mahadevan,et al. Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.
[2] Massimo Gallo,et al. Modeling data transfer in content-centric networking , 2011, 2011 23rd International Teletraffic Congress (ITC).
[3] Jennifer Rexford,et al. Autonomous security for autonomous systems , 2008, Comput. Networks.
[4] Tobias Lauinger,et al. Security & Scalability of Content-Centric Networking , 2010 .
[5] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[6] Pablo Rodriguez,et al. Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures , 2012 .
[7] Lixia Zhang,et al. Understanding the Challenges in Securing Internet Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[8] Sugata Sanyal,et al. A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.
[9] Jim Kurose,et al. Computer Networking: A Top-Down Approach (6th Edition) , 2007 .
[10] Traian Andrei. Cloud Computing Challenges and Related Security Issues , 2009 .
[11] Pablo Rodriguez,et al. Privacy risks in named data networking: what is the cost of performance? , 2012, CCRV.
[12] Rui Chen,et al. Live Streaming with Content Centric Networking , 2012, 2012 Third International Conference on Networking and Distributed Computing.
[13] Van Jacobson,et al. A new approach to securing audio conference tools , 2011, AINTEC '11.
[14] R. Lua,et al. Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.
[15] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[16] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[17] Aleksandar Kuzmanovic,et al. Pollution attacks and defenses for Internet caching systems , 2008, Comput. Networks.
[18] Lixia Zhang,et al. Data naming in Vehicle-to-Vehicle communications , 2012, 2012 Proceedings IEEE INFOCOM Workshops.