A World on NDN: Affordances & Implications of the Named Data Networking Future Internet Architecture
暂无分享,去创建一个
kc claffy | Lixia Zhang | Katie Shilton | Jeff Burke | Charles Duan | Lixia Zhang | J. Burke | K. Claffy | Katie Shilton | Charles Duan
[1] Woodrow Hartzog,et al. The Case for Online Obscurity , 2012 .
[2] Lisa A. Ennis,et al. Wired Shut: Copyright and the Shape of Digital Culture , 2007 .
[3] Milton L. Mueller,et al. The end of the net as we know it? Deep packet inspection and internet governance , 2011, New Media Soc..
[4] Deborah G. Johnson,et al. Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..
[5] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[6] Anil Kumar. Understanding Privacy , 2010 .
[7] Gene Tsudik,et al. ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.
[8] Priya Mahadevan,et al. Custodian-based information sharing , 2012, IEEE Communications Magazine.
[9] Viktor Mayer-Schoenberger,et al. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing , 2007 .
[10] Lee A. Bygrave,et al. A right to be forgotten? , 2014, Commun. ACM.
[11] Julie E. Cohen. A Right to Read Anonymously: A Closer Look at , 1997 .
[12] Julie E. Cohen. DRM and privacy , 2003, CACM.
[13] Louise Cooke,et al. Controlling the net: European approaches to content and access regulation , 2007, J. Inf. Sci..
[14] Dorothy J. Glancy. At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet , 2000 .
[15] S. L. Star,et al. The Ethnography of Infrastructure , 1999 .
[16] J. Peha. The Benefits and Risks of Mandating Network Neutrality, and the Quest for a Balanced Policy , 2006 .
[17] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[18] Jenny Fry,et al. Engaging Privacy and Information Technology in a Digital Age , 2008 .
[19] Michael L. Best,et al. Democratic and Anti-Democratic Regulators of the Internet: A Framework , 2007, Inf. Soc..
[20] Danielle Keats Citron. Civil Rights in Our Information Age , 2012 .
[21] Su Li,et al. Mobile Phones and Privacy , 2012 .
[22] V. Caron,et al. United states. , 2018, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[23] Laura DeNardis,et al. HIDDEN LEVERS OF INTERNET CONTROL , 2012 .
[24] Neil M. Richards. The Perils of Social Reading , 2012 .
[25] Alice E. Marwick,et al. Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .
[26] Lawrence Lessig,et al. Code - version 2.0 , 2006 .