暂无分享,去创建一个
Rasheed Hussain | Hassine Moungla | Boubakr Nour | Spyridon Mastorakis | Hakima Khelifi | Spyridon Mastorakis | Boubakr Nour | Hassine Moungla | Hakima Khelifi | Rasheed Hussain
[1] Dipankar Raychaudhuri,et al. MobilityFirst future internet architecture project , 2011, AINTEC '11.
[2] Deborah Estrin,et al. Named Data Networking (NDN) Project , 2010 .
[3] Lixia Zhang,et al. Hop-By-Hop Best Effort Link Layer Reliability in Named Data Networking , 2016 .
[4] Leïla Azouz Saïdane,et al. PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[5] Gene Tsudik,et al. When encryption is not enough: privacy attacks in content-centric networking , 2017, ICN.
[6] Adlen Ksentini,et al. Coexistence of ICN and IP Networks: An NFV as a Service Approach , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[7] Xin Chen,et al. Copyright protection in named data networking , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[8] Abderrahmen Mtibaa,et al. Towards Service Discovery and Invocation in Data-Centric Edge Networks , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).
[9] Alexander Afanasyev,et al. The Design of RoundSync Protocol , 2017 .
[10] Christopher A. Wood,et al. Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[11] Sihem Guemara El Fatmi,et al. Access control enforcement in Named Data Networking , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[14] Leandro A. Villas,et al. Vehicular Data Space: The Data Point of View , 2019, IEEE Communications Surveys & Tutorials.
[15] Samuel Marchal,et al. PrivICN: Privacy-preserving content retrieval in information-centric networking , 2019, Comput. Networks.
[16] Satyajayant Misra,et al. AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge , 2019, IEEE Transactions on Dependable and Secure Computing.
[17] Yang Liu,et al. A unified hybrid information-centric naming scheme for IoT applications , 2020, Comput. Commun..
[18] Emiliano De Cristofaro,et al. Privacy in content-oriented networking: threats and countermeasures , 2012, CCRV.
[19] Senlin Luo,et al. In-Network Caching in ICN-based Vehicular Networks: Effectiveness & Performance Evaluation , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[20] Mauro Conti,et al. Security and Privacy Analysis of National Science Foundation Future Internet Architectures , 2018, IEEE Communications Surveys & Tutorials.
[21] Lixia Zhang,et al. Distributed Dataset Synchronization in Disruptive Networks , 2019, 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[22] Stefano Paraboschi,et al. A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks , 2015, Comput. Networks.
[23] Alexander Afanasyev,et al. NAC: name-based access control in named data networking , 2017, ICN.
[24] Senlin Luo,et al. Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.
[25] Senlin Luo,et al. An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[26] Tao Feng,et al. A New Access Control System Based on CP-ABE in Named Data Networking , 2018, Int. J. Netw. Secur..
[27] Hassine Moungla,et al. A Label-based Producer Mobility Support in 5G-enabled ICN Networks , 2020, 2020 International Wireless Communications and Mobile Computing (IWCMC).
[28] Guoqiang Zhang,et al. Caching in information centric networking: A survey , 2013, Comput. Networks.
[29] Yang Liu,et al. M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things , 2017, WASA.
[30] Xiaojiang Du,et al. T-CAM: Time-based content access control mechanism for ICN subscription systems , 2020, Future Gener. Comput. Syst..
[31] Mohsen Guizani,et al. Bringing Deep Learning at the Edge of Information-Centric Internet of Things , 2019, IEEE Communications Letters.
[32] Alexander Afanasyev,et al. Fuzzy Interest Forwarding , 2017, AINTEC.
[33] Nadeem Javaid,et al. Realization of VANET-Based Cloud Services through Named Data Networking , 2018, IEEE Communications Magazine.
[34] Mohsen Guizani,et al. A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..
[35] M. Laurent-Maknavicius,et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.
[36] Donghyun Kim,et al. Conditional proxy re-encryption for secure big data group sharing in cloud environment , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[37] Raj Jain,et al. A survey of the research on future internet architectures , 2011, IEEE Communications Magazine.
[38] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[39] Mohsen Guizani,et al. Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions , 2018, IEEE Communications Surveys & Tutorials.
[40] Christos-Alexandros Sarros,et al. Reputation-Based Trust Approaches in Named Data Networking , 2019, Future Internet.
[41] Lixia Zhang,et al. A Survey of Distributed Dataset Synchronization in Named Data Networking , 2017 .
[42] Ravi S. Sandhu,et al. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking , 2015, IEEE Transactions on Information Forensics and Security.
[43] Chin-Yu Wu,et al. FGAC-NDN: Fine-Grained Access Control for Named Data Networks , 2019, IEEE Transactions on Network and Service Management.
[44] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[45] Feng Wu,et al. A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.
[46] Gene Tsudik,et al. AC3N: Anonymous communication in Content-Centric Networking , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[47] Fuchun Guo,et al. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..
[48] Aytac Azgin,et al. Achieving secure and scalable data access control in information-centric networking , 2015, 2015 IEEE International Conference on Communications (ICC).
[49] Mohsen Guizani,et al. PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking , 2020, Future Gener. Comput. Syst..
[50] Nikos Fotiou,et al. Rendezvous-based access control for information-centric architectures , 2018, Int. J. Netw. Manag..
[51] Byung-Seo Kim,et al. ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks , 2020, Future Gener. Comput. Syst..
[52] Name-Based Access Control , 2015 .
[53] Hossam S. Hassanein,et al. A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.
[54] Kashif Sharif,et al. A Distributed ICN-Based IoT Network Architecture: An Ambient Assisted Living Application Case Study , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[55] Anna Volkova,et al. Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[56] Yanghee Choi,et al. A Survey on content-oriented networking for efficient content delivery , 2011, IEEE Communications Magazine.
[57] Bengt Ahlgren,et al. A survey of information-centric networking , 2012, IEEE Communications Magazine.
[58] Mohsen Guizani,et al. Internet of Things Mobility Over Information-Centric/Named-Data Networking , 2020, IEEE Internet Computing.
[59] Sapna Singh,et al. A Trust Based Approach For Secure Access Control In Information Centric Network , 2012 .
[60] Ersin Uzun,et al. Trust in Information-Centric Networking: From Theory to Practice , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[61] Alexander Afanasyev,et al. CS Interest PIT FIB Data Interest Add incoming interface Drop or NACK F F PIT CS Data Discard cache Downstream Upstream Lookup miss Lookup hit F F Data , 2018 .
[62] Matthias Wählisch,et al. Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy , 2017, CCRV.
[63] Senlin Luo,et al. A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[64] Patrick Crowley,et al. iSync: a high performance and scalable data synchronization protocol for named data networking , 2014, ICN '14.
[65] Anand Seetharam. On Caching and Routing in Information-Centric Networks , 2018, IEEE Communications Magazine.
[66] Tao Chen,et al. An encryption and probability based access control model for named data networking , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[67] Xiang-Chuan Gao,et al. Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions , 2021, J. Netw. Comput. Appl..
[68] Gene Tsudik,et al. Interest-Based Access Control for Content Centric Networks , 2015, ICN.
[69] Zhijun Wu,et al. CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[70] Boubakr Nour,et al. Compute-Less Networking: Perspectives, Challenges, and Opportunities , 2020, IEEE Network.
[71] Christian F. Tschudin,et al. Schematized access control for data cubes and trees , 2017, ICN.
[72] Alexander Afanasyev,et al. NDN-ABS: Attribute-Based Signature Scheme for Named Data Networking , 2019, ICN.
[73] Maitreyee Dutta,et al. A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things , 2019, IEEE Access.
[74] Zhenfu Cao,et al. Securing Named Data Networking: Attribute-Based Encryption and Beyond , 2018, IEEE Communications Magazine.
[75] Phan Cong Vinh,et al. Security Analysis of the Access Control Solution of NDN Using BAN Logic , 2020, Mob. Networks Appl..
[76] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[77] Mingwei Xu,et al. Session-based access control in information-centric networks: Design and analyses , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[78] Xiaochen Zhang,et al. SBAC: A secure blockchain-based access control framework for information-centric networking , 2020, J. Netw. Comput. Appl..
[79] Chun Yang,et al. Securing content-centric networks with content-based encryption , 2019, J. Netw. Comput. Appl..
[80] Kashif Sharif,et al. NNCP: A Named Data Network Control Protocol for IoT Applications , 2018, 2018 IEEE Conference on Standards for Communications and Networking (CSCN).
[81] Jalel Ben-Othman,et al. DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.
[82] Mohsen Guizani,et al. A survey of Internet of Things communication using ICN: A use case perspective , 2019, Comput. Commun..
[83] Alexander Afanasyev,et al. Real-Time Data Retrieval in Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[84] Lixia Zhang,et al. An Overview of Security Support in Named Data Networking , 2018, IEEE Communications Magazine.
[85] Ahmed E. Kamal,et al. NCP: A near ICN Cache Placement Scheme for IoT-Based Traffic Class , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[86] Christian F. Tschudin,et al. Access-Controlled In-Network Processing of Named Data , 2016, ICN.
[87] Carlos Maziero,et al. A distributed online certificate status protocol for named data networks , 2018, SAC.
[88] Christian F. Tschudin. Private Information Retrieval over ICN , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[89] Fabian Oehlmann,et al. Content-Centric Networking , 2013 .
[90] Senlin Luo,et al. LQCC: A Link Quality-based Congestion Control Scheme in Named Data Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[91] Shuai Gao,et al. CDAC: A Collaborative Data Access Control Scheme in Named Data Networking , 2019, 2019 2nd International Conference on Hot Information-Centric Networking (HotICN).
[92] Syed Hassan Ahmed,et al. Named Data Networking for Software Defined Vehicular Networks , 2017, IEEE Communications Magazine.
[93] Abderrahmane Lakas,et al. MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking , 2020, Future Gener. Comput. Syst..
[94] Zhijun Wu,et al. Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN , 2020, Future Internet.
[95] Senlin Luo,et al. Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks , 2018, 2018 IEEE Conference on Standards for Communications and Networking (CSCN).
[96] Pekka Nikander,et al. Developing Information Networking Further: From PSIRP to PURSUIT , 2010, BROADNETS.
[97] Sihem Guemara El Fatmi,et al. A credential and encryption based access control solution for named data networking , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[98] Ning Wang,et al. COMET: Content mediator architecture for content-aware networks , 2011, 2011 Future Network & Mobile Summit.
[99] Sérgio Donizetti Zorzo,et al. An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[100] Atsushi Tagami,et al. A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking , 2016, ICN.
[101] Teng Liang,et al. NDNizing existing applications: research issues and experiences , 2018, ICN.
[102] Senlin Luo,et al. Security and Privacy Issues in Vehicular Named Data Networks: An Overview , 2018, Mob. Inf. Syst..
[103] Jian Shen,et al. Key-policy attribute-based encryption against continual auxiliary input leakage , 2019, Inf. Sci..
[104] Siu-Ming Yiu,et al. A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms , 2016, IEEE Communications Surveys & Tutorials.
[105] Suyong Eum,et al. Information-Centric Networking (ICN) Research Challenges , 2016, RFC.
[106] Pei-Chi Huang,et al. DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding , 2020, 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC).
[107] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[108] Edith C. H. Ngai,et al. Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).
[109] Satyajayant Misra,et al. Secure content delivery in information-centric networks: design, implementation, and analyses , 2013, ICN '13.
[110] Giannis F. Marias,et al. Access control enforcement delegation for information-centric networking architectures , 2012, ICN.
[111] Yu Zhang,et al. KITE: producer mobility support in named data networking , 2018, ICN.
[112] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[113] Alexander Afanasyev,et al. nTorrent: Peer-to-Peer File Sharing in Named Data Networking , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[114] Satyajayant Misra,et al. ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.
[115] Liu Yan,et al. Packet Forwarding in Named Data Networking Requirements and Survey of Solutions , 2019, IEEE Communications Surveys & Tutorials.
[116] Syed Hassan Ahmed,et al. Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
[117] Safdar H. Bouk,et al. A Collaborative Multi-Metric Interface Ranking Scheme for Named Data Networks , 2020, 2020 International Wireless Communications and Mobile Computing (IWCMC).
[118] Patrick Crowley,et al. Synchronizing namespaces with invertible bloom filters , 2015, 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).
[119] Haitao Zhang,et al. Data synchronization in Ad Hoc mobile networks , 2018, ICN.
[120] Jalel Ben-Othman,et al. GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs , 2017, IEEE Transactions on Mobile Computing.
[121] Neeraj Suri,et al. Named Data Networking: A survey , 2016, Comput. Sci. Rev..
[122] Sihem Guemara El Fatmi,et al. Data-based access control in named data networking , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[123] F. Richard Yu,et al. A Survey of Green Information-Centric Networking: Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[124] Gene Tsudik,et al. In Content We Trust: Network-Layer Trust in Content-Centric Networking , 2019, IEEE/ACM Transactions on Networking.
[125] Akbar Rahman,et al. Deployment Considerations for Information-Centric Networking (ICN) , 2020, RFC.
[126] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[127] Lan Wang,et al. Secure bootstrapping and access control in NDN-based smart home systems , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[128] Ersin Uzun,et al. An encryption-based access control framework for content-centric networking , 2015, 2015 IFIP Networking Conference (IFIP Networking).
[129] Gennaro Boggia,et al. Information-Centric Networking: Evaluation and Security Considerations , 2016, RFC.
[130] Senlin Luo,et al. A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[131] Xiongwen Zhao,et al. 3D MIMO for 5G NR: Several Observations from 32 to Massive 256 Antennas Based on Channel Measurement , 2018, IEEE Communications Magazine.
[132] Raouf Boutaba,et al. A survey of naming and routing in information-centric networks , 2012, IEEE Communications Magazine.
[133] Michal Król,et al. Compute First Networking: Distributed Computing meets ICN , 2019, ICN.
[134] Nikos Fotiou,et al. A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.
[135] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[136] Athanasios V. Vasilakos,et al. Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..
[137] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[138] Syed Hassan Ahmed,et al. Named Data Networking’s Intrinsic Cyber-Resilience for Vehicular CPS , 2018, IEEE Access.
[139] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..
[140] Jun Bi,et al. A survey on Information-centric Networking: Rationales, designs and debates , 2015 .
[141] Kalika Suksomboon,et al. IPRES: in-device proxy re-encryption service for secure ICN , 2017, ICN.
[142] Johannes A. Buchmann,et al. CMSS - An Improved Merkle Signature Scheme , 2006, INDOCRYPT.
[143] Nikos Fotiou,et al. Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[144] Reihaneh Safavi-Naini,et al. A Post-Quantum One Time Signature Using Bloom Filter , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[145] Denis Butin,et al. Hash-Based Signatures: State of Play , 2017, IEEE Security & Privacy.
[146] Ibrahim Abdullahi,et al. Survey on caching approaches in Information Centric Networking , 2015, J. Netw. Comput. Appl..
[147] Lixia Zhang,et al. DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).
[148] Donghyun Kim,et al. A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment , 2017, Concurr. Comput. Pract. Exp..
[149] Dijiang Huang,et al. Toward Privacy-preserving Content Access Control for Information Centric Networking , 2014 .
[150] Xiaojiang Du,et al. Content Protection in Named Data Networking: Challenges and Potential Solutions , 2018, IEEE Communications Magazine.
[151] Yu Wang,et al. ICN Publisher-Subscriber Models: Challenges and Group-based Communication , 2019, IEEE Network.
[152] Roman Lutz,et al. Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks , 2016, ArXiv.
[153] Byung-Seo Kim,et al. Information-Centric Networking With Edge Computing for IoT: Research Challenges and Future Directions , 2018, IEEE Access.
[154] Hannes Frey,et al. EnCIRCLE: Encryption-based access control for information-centric connected vehicles , 2017, 2017 8th International Conference on the Network of the Future (NOF).
[155] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[156] Nicola Blefari-Melazzi,et al. Publish/subscribe over information centric networks: A Standardized approach in CONVERGENCE , 2012, 2012 Future Network & Mobile Summit (FutureNetw).
[157] Chengyu Fan,et al. SCARI: a strategic caching and reservation protocol for ICN , 2018, ICN.
[158] Hassine Moungla,et al. CnS: A Cache and Split Scheme for 5G-enabled ICN Networks , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).