1 |
"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015-2020," Cisco Public, February 3, 2016
|
2 |
"Cisco Visual Networking Index: Forecast and Methodology, 2015-2020," Cisco Public, February 3, 2016
|
3 |
A. K. Pathan, and R. Buyya, "A Taxonomy and Survey of Content Delivery Networks," Tech Report, Univ. of Melbourne, 2007.
|
4 |
E. Meshkova, J. Riihijarvi, M. Petrova, and P. Mahonen, "A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks," Computer Networks J., Vol. 52, No. 11, pp. 2097-2128, 2008.
DOI
|
5 |
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlmann, "A Survey of Information-Centric Networking," IEEE Communications Magazine, Vol. 50, No. 7, pp. 26-36, July 2012.
DOI
|
6 |
V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1-12, 2009.
|
7 |
D. Kim, "Content Centric Networking Naming Scheme for Efficient Data Sharing," Journal of Korea Multimedia Society, Vol. 15, No. 9, pp. 1126-1132, 2012.
DOI
|
8 |
"Trend and Improvement for Privacy Protection of Future Internet," Journal of Digital Convergence v. 14, n. 6, pp. 405-413, Jun. 2016
DOI
|
9 |
D. Kim, "A Comparison Study on Data Caching Policies of CCN," Journal of Digital Convergence v.15, n.1, pp. 327-334, Feb, 2017
|
10 |
R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, Apr.1980.
|
11 |
D. Y. Kim and J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform. Sciences, Vol. 39, No. 4, pp. 234-241, April, 2014.
|
12 |
D. Kim, "A Efficient Content Verification Scheme for Distributed Networking/Data Store," Journal of The Korea Institue of Information Security & Cryptology, Vol. 25, No. 4, Aug. 2015.
|
13 |
T. Cormen,"Introduction to Algorithm," The MIT Press, pp. 301-328, 1992
|
14 |
D. Kim, "Group-Interest-based Verifiable CCN," Mobile Information Systems, Volume 2016, Article ID 9202151
|
15 |
B. Georg "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis,". Ruhr-Universität Bochum. Retrieved 2013-11-20.
|
16 |
D. Clark, "The Design Philosophy of the DARPA Internet Protocols," ACM Sigcomm Comp. Comm. Review, Vol. 18, No. 1, pp. 106-114, Aug. 1988.
DOI
|