References
- T. Koponen, M. Chawla, B.G. Chun, et al., "A data-oriented(and beyond) network architecture," ACM SIGCOMM Computer Communication Review, vol. 37, no.4, pp. 181-192, 2007. https://doi.org/10.1145/1282427.1282402
- S. Tarkoma, M. Ain, K. Visala, "The publish/subscribe internet routing paradigm (psirp): Designing the future internet architecture," Future Internet Assembly, pp. 102-111, April, 2009.
- L. Zhang, D. Estrin, J. Burke, et al., "Named data networking (ndn) project," in Proc. of Relatorio Tecnico NDN-0001, Xerox Palo Alto Research Center-PARC ,2010.
- L. Zhang, A. Afanasyev, J. Burke, et al., "Named data networking," ACM SIGCOMM Computer Communication Review, vol. 44, no.3, pp. 66-73, 2014. https://doi.org/10.1145/2656877.2656887
- E. Ngai, B. Ohlman, G. Tsudik, et al., "Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy," ACM SIGCOMM Computer Communication Review, vol. 47, no.1, pp. 49-54, 2017. https://doi.org/10.1145/3041027.3041034
- Vasilakos, V. Athanasis, Z. Li, et al., "Information centric network: Research challenges and opportunities," Journal of Network and Computer Applications, vol. 52, pp.1-10, 2015. https://doi.org/10.1016/j.jnca.2015.02.001
- D. Saxena, V. Raychoudhury, N. Suri, et al., "Named data networking: a survey," Computer Science Review, vol.19, pp.15-55, 2016. https://doi.org/10.1016/j.cosrev.2016.01.001
- T. Lauinger, "Security & scalability of content-centric networking," Master's thesis, Technische University, 2010.
- Dogruluk, Ertugrul, A. Costa, and J. Macedo, "Evaluating privacy attacks in Named Data Network," in Proc. of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 1251-1256, 2016.
- G. Acs, M. Conti, P. Gasti, et al., "Cache privacy in named-data networking," in Proc. of 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 41-51, 2013.
- A. Mohaisen, X. Zhang, M. Schuchard, et al., "Protecting access privacy of cached contents in information centric networks," in Proc. of Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 173-178, 2013.
- A. Mohaisen, H. Mekky, X. Zhang, et al., "Timing attacks on access privacy in information centric networks and countermeasures," IEEE Transactions on Dependable and Secure Computing, vol.12, no.6, pp. 675-687, 2015. https://doi.org/10.1109/TDSC.2014.2382592
- Da Silva, Roan Simoes, Sergio Donizetti Zorzo, "An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges," in Proc. of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 128-133, 2015.
- M. Ion, J. Zhang, E. M. Schooler, "Toward content-centric privacy in ICN: Attribute-based encryption and routing," in Proc. of Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, ACM, pp. 39-40, 2013.
- T. Chen, K. Lei, K. Xu, et al., "An encryption and probability based access control model for named data networking," in Proc. of 2014 IEEE International Performance Computing and Communications Conference (IPCCC), IEEE, pp. 1-8, 2014.
- T. Lauinger, N. Laoutaris, P. Rodriguez, et al., "Privacy risks in named data networking: what is the cost of performance?," in Proc. of ACM SIGCOMM Computer Communication Review, vol.42, no.5, pp. 54-57, 2012.
- T. Lauinger, N. Laoutaris, P. Rodriguez, et al., "Privacy implications of ubiquitous caching in named data networking architectures," Technical Report TR-iSecLab-0812-001, ISecLab, Tech. Rep., 2012.
- A. Chaabane, E. De Cristofaro, M. A. Kaafar, et al., "Privacy in content-oriented networking: Threats and countermeasures," in Proc. of ACM SIGCOMM Computer Communication Review, vol.43, no.3, pp. 25-33, 2013. https://doi.org/10.1145/2500098.2500102
- S. Arianfar, T. Koponen, B. Raghavan, et al., "On preserving privacy in content-oriented networks." in Proc. of Proceedings of the ACM SIGCOMM workshop on Information-centric networking, ACM, pp. 19-24, 2011.
- Z. Xingwen, H. Li, "Privacy Preserving Data Sharing Scheme in Content Centric Networks against Collusion Name Guessing Attacks," IEEE Access, vol.5, pp.23182-23189, 2017. https://doi.org/10.1109/ACCESS.2017.2740623
- B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM , vol. 13, no. 7, pp. 422-426, 1970. https://doi.org/10.1145/362686.362692
- S. Mastorakis, A. Afanasyev, L.Zhang, "On the Evolution of ndnSIM: an Open-Source Simulator for NDN Experimentation," in Proc. of ACM SIGCOMM Computer Communication Review, vol. 47, no.3, pp. 19-33, 2017.
- S. Mastorakis, A. Afanasyev, I. Moiseenko, et al., "ndnsim 2.0: A new version of the ndn simulator for ns-3," NDN, Technical Report NDN-0028, 2015.
- M. Mangili, F Martignon, S Paraboschi, "A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in content-centric networks," Computer Networks, no.76, pp.126-145, 2015.
- C. Fricker, P. Robert, J. Roberts, N. Sbihi, "Impact of traffic mix on caching performance in a content-centric network," in Proc. of 2012 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp. 310-315, 2012.
- I. Psaras, R. G. Clegg, R. Landa, et al, " Modeling and Evaluation of CCN-Caching Trees," IFIP Networking, pp.78-91, 2011.
- Y. Collet, "xxhash-extremeley fast hash algorithm," 2016.
- T. M. Cover, J. A. Thomas, "Elements of information theory," John Wiley & Sons, New York, 2012.
- N. Laoutaris, H. Che, I. Stavrakakis, "The lcd interconnection of lru caches and its analysis," Performance Evaluation, vol. 63, pp. 609-634, 2006. https://doi.org/10.1016/j.peva.2005.05.003