1 |
M. Y. Chen, E. Kiciman, E. Fratkin, A. Fox and E. Brewer, "Pinpoint: Problem Determination in Large, Dynamic Internet Services," Proceedings of the International Conference on Dependable Systems and Networks (DSN'2), pp.595-604, June 23-26, 2002.
|
2 |
L. Wang, "Content, Topology and Cooperation in In-network Caching," Series of Publications A Report A-2015-1, Department of Computer Science, University of Helsinki, Finland, 2015.
|
3 |
M. Arifuzzaman, K. Yu and T. Sato, "Collaboration between Network Playersof Information Centric Network: An Engineering-Economic Analysis," Journal of ICT, Vol. 2, pp. 201-220, 2015.
|
4 |
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," ACMCoNext, pp. 1-6, Dec. 2009.
|
5 |
J. Pan, S. Paul, and R. Jain, "A Survey of the Research on Future Internet Architectures," IEEE Communications Magazine, pp. 26-36, July, 2011.
|
6 |
L. Zhang, et al., "Named Data Networking (NDN) Project," NDN-0001, Oct. 2010.
|
7 |
R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, Apr.1980.
|
8 |
S. Hyun, P. Ning, A. Liu and W. Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Network," Proc. Int',l Conf. Information Processing in Sensor Networks (IPSN',08), pp. 445-456, 2008
|
9 |
D. Y. Kim, J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform. Sciences, vol. 39, no. 4, pp. 234-241, April, 2014.
|
10 |
Xylomenos, G., Polyzos, G.C., "TCP and UDP performance over a wireless LAN," INFOCOM 99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. vol. 2, pp. 439 - 446, Mar. 1999.
|