{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:17:18Z","timestamp":1740097038283,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_8","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T20:43:14Z","timestamp":1400100194000},"page":"117-132","source":"Crossref","is-referenced-by-count":7,"title":["A Framework for Privacy Analysis of ICN Architectures"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Fotiou","sequence":"first","affiliation":[]},{"given":"Somaya","family":"Arianfar","sequence":"additional","affiliation":[]},{"given":"Mikko","family":"S\u00e4rel\u00e4","sequence":"additional","affiliation":[]},{"given":"George C.","family":"Polyzos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G.: Cache privacy in named-data networking. In: The 33rd International Conference on Distributed Computing Systems, ICDCS (2013)","DOI":"10.1109\/ICDCS.2013.12"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Arianfar, S., Koponen, T., Raghavan, B., Shenker, S.: On preserving privacy in content-oriented networks. In: Proc. ACM SIGCOMM Workshop on Information-Centric Networking (ICN), pp. 19\u201324 (2011)","DOI":"10.1145\/2018584.2018589"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2500098.2500102","volume":"43","author":"A. Chaabane","year":"2013","unstructured":"Chaabane, A., De Cristofaro, E., Kaafar, M.A., Uzun, E.: Privacy in content-oriented networking: threats and countermeasures. SIGCOMM Comput. Commun. Rev.\u00a043(3), 25\u201333 (2013)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M. Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering\u00a016(1), 3\u201332 (2011), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/s00766-010-0115-7\n                    \n                    \n                  , doi:10.1007\/s00766-010-0115-7","journal-title":"Requirements Engineering"},{"key":"8_CR5","unstructured":"DiBenedetto, S., Gasti, P., Tsudik, G., Uzun, E.: Andana: Anonymous named data networking application (2012)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Nikander, P., Trossen, D., Polyzos, G.C.: Developing information networking further: From psirp to pursuit. Tech. rep. (2012)","DOI":"10.1007\/978-3-642-30376-0_1"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Trossen, D., Marias, G., Kostopoulos, A., Polyzos, G.C.: Enhancing information lookup privacy through homomorphic encryption. Security and Communication Networks (2013)","DOI":"10.1002\/sec.910"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets 2011, pp.1:1\u20131:6. ACM, New York (2011), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/2070562.2070563\n                    \n                    \n                  , doi:10.1145\/2070562.2070563","DOI":"10.1145\/2070562.2070563"},{"key":"8_CR9","unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code, 2nd edn. Microsft Press (2002)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking Named Content. In: Proc. ACM CoNEXT (2009)","DOI":"10.1145\/1658939.1658941"},{"issue":"5","key":"8_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/2378956.2378966","volume":"42","author":"T. Lauinger","year":"2012","unstructured":"Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., Kirda, E.: Privacy risks in named data networking: what is the cost of performance? SIGCOMM Comput. Commun. Rev.\u00a042(5), 54\u201357 (2012)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Solove, D.J.: A taxonomy of privacy. University of Pennsylvania Law Review pp. 477\u2013564 (2006)","DOI":"10.2307\/40041279"},{"issue":"2","key":"8_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1764873.1764878","volume":"40","author":"D. Trossen","year":"2010","unstructured":"Trossen, D., S\u00e4rel\u00e4, M., Sollins, K.: Arguments for an information-centric internetworking architecture. SIGCOMM Computer Communication Review\u00a040(2), 26\u201333 (2010)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"8_CR15","first-page":"1","volume":"99","author":"G. Xylomenos","year":"2013","unstructured":"Xylomenos, G., Ververidis, C., Siris, V., Fotiou, N., Tsilopoulos, C., Vasilakos, X., Katsaros, K., Polyzos, G.C.: A survey of information-centric networking research. IEEE Communications Surveys Tutorials\u00a099, 1\u201326 (2013)","journal-title":"IEEE Communications Surveys Tutorials"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T16:38:11Z","timestamp":1558888691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}