{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:35Z","timestamp":1760239955876,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032079008","type":"print"},{"value":"9783032079015","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07901-5_18","type":"book-chapter","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:29:58Z","timestamp":1760185798000},"page":"354-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Security-Enhanced Accountable Access Control for\u00a0Named Data Networking"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6944-8378","authenticated-orcid":false,"given":"Jianfei","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9023-0894","authenticated-orcid":false,"given":"Yuxian","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5426-0102","authenticated-orcid":false,"given":"Xuehuan","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4949-7738","authenticated-orcid":false,"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.future.2023.09.031","volume":"151","author":"A Anjum","year":"2024","unstructured":"Anjum, A., Agbaje, P., Mitra, A., Oseghale, E., Nwafor, E., Olufowobi, H.: Towards named data networking technology: emerging applications, use cases, and challenges for secure data communication. FGCS 151, 12\u201331 (2024)","journal-title":"FGCS"},{"key":"18_CR2","unstructured":"Ben, L., Ospanova, A.B.: Pbc library. In: https:\/\/crypto.stanford.edu\/pbc\/. Standfor University (2024)"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/JSYST.2019.2931813","volume":"14","author":"M Bilal","year":"2019","unstructured":"Bilal, M., Pack, S.: Secure distribution of protected content in information-centric networking. IEEE Syst. J. 14(2), 1921\u20131932 (2019)","journal-title":"IEEE Syst. J."},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"key":"18_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110995","volume":"257","author":"P Chaudhary","year":"2025","unstructured":"Chaudhary, P., Hubballi, N.: Pencache: popularity based cooperative caching in named data networks. Comput. Netw. 257, 110995 (2025)","journal-title":"Comput. Netw."},{"issue":"2","key":"18_CR6","first-page":"468","volume":"25","author":"CK Chu","year":"2013","unstructured":"Chu, C.K., Chow, S.S., Tzeng, W.G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE TPDS 25(2), 468\u2013477 (2013)","journal-title":"IEEE TPDS"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/COMST.2022.3143147","volume":"24","author":"E Daniel","year":"2022","unstructured":"Daniel, E., Tschorsch, F.: IPFS and friends: a qualitative comparison of next generation peer-to-peer data networks. IEEE Commun. Surv. Tutorials 24(1), 31\u201352 (2022)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11958239_13","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"C Delerabl\u00e9e","year":"2006","unstructured":"Delerabl\u00e9e, C., Pointcheval, D.: Dynamic fully anonymous short group signatures. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193\u2013210. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11958239_13"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Polyzos, G.C.: Securing content sharing over ICN. In: Proceedings of the 3rd ACM Conference on Information-Centric Networking, pp. 176\u2013185 (2016)","DOI":"10.1145\/2984356.2984376"},{"issue":"11","key":"18_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2018.8539022","volume":"56","author":"X Fu","year":"2018","unstructured":"Fu, X., Kutscher, D., Misra, S., Li, R.: Information-centric networking security. IEEE Commun. Mag. 56(11), 60\u201361 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"18_CR11","first-page":"316","volume":"19","author":"D Han","year":"2020","unstructured":"Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE TDSC 19(1), 316\u2013327 (2020)","journal-title":"IEEE TDSC"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"He, P., Wan, Y., Xia, Q., Li, S., Hong, J., Xue, K.: Lasa: lightweight, auditable and secure access control in ICN with limitation of access times. In: ICC 2018, pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422829"},{"issue":"2","key":"18_CR13","first-page":"194","volume":"15","author":"B Li","year":"2016","unstructured":"Li, B., Huang, D., Wang, Z., Zhu, Y.: Attribute-based access control for ICN naming scheme. IEEE TDSC 15(2), 194\u2013206 (2016)","journal-title":"IEEE TDSC"},{"issue":"2","key":"18_CR14","first-page":"308","volume":"10","author":"Q Li","year":"2014","unstructured":"Li, Q., Zhang, X., Zheng, Q., Sandhu, R., Fu, X.: Live: lightweight integrity verification and content access control for named data networking. IEEE TIFS 10(2), 308\u2013320 (2014)","journal-title":"IEEE TIFS"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1109\/COMST.2023.3244674","volume":"25","author":"B Mao","year":"2023","unstructured":"Mao, B., Liu, J., Wu, Y., Kato, N.: Security and privacy on 6g network edge: a survey. IEEE Communi. Surv. Tutorials 25(2), 1095\u20131127 (2023)","journal-title":"IEEE Communi. Surv. Tutorials"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Meng, F., Cheng, L.: Str-abks: server-aided traceable and revocable attribute-based encryption with keyword search. IEEE IoTJ (2023)","DOI":"10.1109\/JIOT.2023.3335624"},{"issue":"1","key":"18_CR17","first-page":"5","volume":"16","author":"S Misra","year":"2017","unstructured":"Misra, S., Tourani, R., Natividad, F., Mick, T., Majd, N.E., Huang, H.: Accconf: an access control framework for leveraging in-network cached data in the ICN-enabled wireless edge. IEEE TDSC 16(1), 5\u201317 (2017)","journal-title":"IEEE TDSC"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/978-3-319-93387-0_31","volume-title":"Applied Cryptography and Network Security","author":"IO Nunes","year":"2018","unstructured":"Nunes, I.O., Tsudik, G.: KRB-CCN: lightweight authentication and access control for private content-centric networks. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 598\u2013615. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93387-0_31"},{"issue":"5","key":"18_CR19","first-page":"891","volume":"66","author":"S Patranabis","year":"2016","unstructured":"Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE TC 66(5), 891\u2013904 (2016)","journal-title":"IEEE TC"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.cose.2016.10.005","volume":"65","author":"K Singh","year":"2017","unstructured":"Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput. Secur. 65, 344\u2013372 (2017)","journal-title":"Comput. Secur."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Suksomboon, K., Tagami, A., Basu, A., Kurihara, J.: In-device proxy re-encryption service for information-centric networking access control. In: LCN 2018, pp. 303\u2013306. IEEE (2018)","DOI":"10.1109\/LCN.2018.8638129"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Sultan, N.H., Varadharajan, V., Kumar, C., Camtepe, S., Nepal, S.: A secure access and accountability framework for provisioning services in named data networks. In: SRDS 2021, pp. 164\u2013175. IEEE (2021)","DOI":"10.1109\/SRDS53918.2021.00025"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/978-3-030-58951-6_28","volume-title":"Computer Security \u2013 ESORICS 2020","author":"NH Sultan","year":"2020","unstructured":"Sultan, N.H., Varadharajan, V., Camtepe, S., Nepal, S.: An accountable access control scheme for hierarchical content in named data networks with revocation. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 569\u2013590. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_28"},{"issue":"4","key":"18_CR24","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1093\/comjnl\/bxad083","volume":"67","author":"NH Sultan","year":"2024","unstructured":"Sultan, N.H., Varadharajan, V., Dulal, S., Camtepe, S., Nepal, S.: NDN-RBE: an accountable privacy aware access control framework for NDN. Comput. J. 67(4), 1572\u20131589 (2024)","journal-title":"Comput. J."},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Sun, R., You, L., Lu, A.A., Sun, C., Gao, X., Xia, X.G.: Precoder design for user-centric network massive mimo with matrix manifold optimization. IEEE JSAC (2025)","DOI":"10.1109\/JSAC.2025.3536504"},{"key":"18_CR26","unstructured":"Tan, X., et al.: Hybrid-coding based content access control for information-centric networking. IEEE TWC (2023)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Tourani, R., Stubbs, R., Misra, S.: Tactic: tag-based access control framework for the information-centric wireless edge networks. In: ICDCS 2018, pp. 456\u2013466. IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00052"},{"issue":"1","key":"18_CR28","first-page":"143","volume":"16","author":"YF Tseng","year":"2018","unstructured":"Tseng, Y.F., Fan, C.I., Wu, C.Y.: FGAC-NDN: fine-grained access control for named data networks. IEEE TNSM 16(1), 143\u2013152 (2018)","journal-title":"IEEE TNSM"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Tuleuov, B.I., Ospanova, A.B.: Openssl. In: Beginning C++ Compilers: An Introductory Guide to Microsoft C\/C++ and MinGW Compilers, pp. 157\u2013163. Springer (2024)","DOI":"10.1007\/978-1-4842-9563-2_14"},{"issue":"11","key":"18_CR30","first-page":"4705","volume":"21","author":"X Wang","year":"2019","unstructured":"Wang, X., Li, Y.: Vehicular named data networking framework. IEEE TITS 21(11), 4705\u20134714 (2019)","journal-title":"IEEE TITS"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Wang, X., Wu, G.: Attribute based vehicular named data networking for driving assistance. IEEE Trans. Netw. Sci. Eng. (2025)","DOI":"10.1109\/TNSE.2025.3550154"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Xia, Q., et al.: TSLS: time sensitive, lightweight and secure access control for information centric networking. In: GLOBECOM 19, pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014220"},{"issue":"4","key":"18_CR33","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TNET.2022.3155110","volume":"30","author":"K Xue","year":"2022","unstructured":"Xue, K., He, P., Yang, J., Xia, Q., Wei, D.S.: Scd2: secure content delivery and deduplication with multiple content providers in information centric networking. IEEE\/ACM ToN 30(4), 1849\u20131864 (2022)","journal-title":"IEEE\/ACM ToN"},{"issue":"3","key":"18_CR34","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1109\/TNET.2019.2914189","volume":"27","author":"K Xue","year":"2019","unstructured":"Xue, K., et al.: A secure, efficient, and accountable edge-based access control framework for information centric networks. IEEE\/ACM ToN 27(3), 1220\u20131233 (2019)","journal-title":"IEEE\/ACM ToN"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Xue, K., Zhang, X., Xia, Q., Wei, D.S., Yue, H., Wu, F.: Seaf: a secure, efficient and accountable access control framework for information centric networking. In: IEEE INFOCOM 2018, pp. 2213\u20132221. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8486407"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks. In: IEEE SP, pp. 130\u2013143. IEEE (2004)","DOI":"10.1109\/SECPRI.2004.1301320"},{"issue":"3","key":"18_CR37","first-page":"745","volume":"1","author":"M Zeghid","year":"2007","unstructured":"Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified AES based algorithm for image encryption. Int. J. Comput. Inf. Eng. 1(3), 745\u2013750 (2007)","journal-title":"Int. J. Comput. Inf. Eng."},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: NDNoT: a framework for named data network of things. In: Proceedings of the 5th ACM Conference on Information-Centric Networking, pp. 200\u2013201 (2018)","DOI":"10.1145\/3267955.3269019"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07901-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:02Z","timestamp":1760185802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07901-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"ISBN":["9783032079008","9783032079015"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07901-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"12 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}