{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:42:44Z","timestamp":1742974964055,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678061"},{"type":"electronic","value":"9783319678078"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67807-8_3","type":"book-chapter","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T12:22:18Z","timestamp":1506428538000},"page":"34-48","source":"Crossref","is-referenced-by-count":4,"title":["An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking"],"prefix":"10.1007","author":[{"given":"Li","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yunmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huayu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: ACM CoNEXT 2009, December 2009","key":"3_CR1","DOI":"10.1145\/1658939.1658941"},{"issue":"5","key":"3_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2677046.2677049","volume":"44","author":"C Ghali","year":"2014","unstructured":"Ghali, C., Tsudik, G., Uzun, E.: Network-layer trust in named-data networking. ACM Sigcomm Comput. Commun. Rev. 44(5), 12\u201319 (2014)","journal-title":"ACM Sigcomm Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Montpetit, M.-J., Westphal, C., Trossen, D.: Networking, network coding meets information-centric: an architectural case for information dispersion through native network coding. In: 1st ACM NoM Workshop, June 2012","key":"3_CR3","DOI":"10.1145\/2248361.2248370"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1109\/JPROC.2010.2093850","volume":"99","author":"J Sundararajan","year":"2011","unstructured":"Sundararajan, J., Shah, D., Medard, M., Jakubczak, S., Mitzenmacher, M., Barros, J.: Network coding meets TCP: theory and implementation. Proc. IEEE 99(3), 490\u2013512 (2011)","journal-title":"Proc. IEEE"},{"unstructured":"Saltarin, J., Bourtsoulatze, E., Thomos, N., Braun, T.: Netcodccn: a network coding approach for content-centric networks, arXiv preprint (2015). arXiv:1512.00259","key":"3_CR5"},{"doi-asserted-by":"publisher","unstructured":"Ramakrishnan, A., Westphal, C., Saltarin, J.: Adaptive video streaming over CCN with network coding for seamless mobility. In: 2016 IEEE International Symposium on Multimedia (ISM), San Jose, CA, pp. 238\u2013242 (2016). doi: 10.1109\/ISM","key":"3_CR6","DOI":"10.1109\/ISM"},{"issue":"5","key":"3_CR7","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R Koetter","year":"2003","unstructured":"Koetter, R., Mdard, M.: An algebraic approach to network coding. IEEE\/ACM Trans. Networking 11(5), 782\u2013795 (2003)","journal-title":"IEEE\/ACM Trans. Networking"},{"unstructured":"Pedersen, M., Heide, J., Vingelmann, P., Fitzek, F.: Network coding over the $$2^{32}-5$$ prime field. In: IEEE ICC 2013, June 2013","key":"3_CR8"},{"doi-asserted-by":"crossref","unstructured":"Zhang, M., Li, H., Chen, F., Hou, H., An, H., Wang, W., Huang, J.: A general co\/decoder of network coding in HDL. In: 2011 International Symposium on Network Coding, July 2011","key":"3_CR9","DOI":"10.1109\/ISNETCOD.2011.5979089"},{"issue":"11","key":"3_CR10","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1109\/LCOMM.2012.092812.121661","volume":"16","author":"N Thomos","year":"2012","unstructured":"Thomos, N., Frossard, P.: Toward one symbol network coding vectors. IEEE Commun. Lett. 16(11), 1860\u20131863 (2012)","journal-title":"IEEE Commun. Lett."},{"unstructured":"Lucani, D.E., Pedersen, M.V., Heide, J., Fitzek, F.H.P., Codes, F.N.: A Code for Fluid Allocation of Complexity (2014). http:\/\/arxiv.org\/abs\/1404.6620","key":"3_CR11"},{"doi-asserted-by":"crossref","unstructured":"Wu, Q., Li, Z., Xie, G.: Codingcache: multipath-aware ccn cache with network coding. In: Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, pp. 41\u201342. ACM (2013)","key":"3_CR12","DOI":"10.1145\/2491224.2491240"},{"unstructured":"Miyake, S., Asaeda, H.: Network coding and its application to content centric networking, Witmse (2013)","key":"3_CR13"},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: An optimal cache management framework for information-centric networks with network coding. In: IFIP\/IEEE Networking Conference, June 2014","key":"3_CR14","DOI":"10.1109\/IFIPNetworking.2014.6857127"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2016.08.004","volume":"110","author":"J Wang","year":"2016","unstructured":"Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: A minimum cost cache management framework for information-centric networks with network coding. Comput. Netw. 110, 1\u201317 (2016)","journal-title":"Comput. Netw."},{"key":"3_CR16","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1109\/JSAC.2016.2577321","volume":"34","author":"Q Wu","year":"2016","unstructured":"Wu, Q., Li, Z., Tyson, G., Uhlig, S., Kaafar, M.A., Xie, G.: Privacyaware multipath video caching for content-centric networks. IEEE J. Sel. Areas Commun. 34, 2219\u20132230 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Fayazbakhsh, S.K., Lin, Y., Tootoonchian, A., Ghodsi, A., Koponen, T., Maggs, B., Ng, K., Sekar, V., Shenker, S.: Less pain, most of the gain: incrementally deployable ICN. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, pp. 147\u2013158. ACM (2013)","key":"3_CR17","DOI":"10.1145\/2486001.2486023"},{"doi-asserted-by":"crossref","unstructured":"Ghodsi, A., Koponen, T., Rajahalme, J., Sarolahti, P., Shenker, S.: Naming in content-oriented architectures. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 1\u20136. ACM (2011)","key":"3_CR18","DOI":"10.1145\/2018584.2018586"},{"doi-asserted-by":"crossref","unstructured":"Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)","key":"3_CR19","DOI":"10.1145\/2070562.2070563"},{"issue":"4","key":"3_CR20","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/1282427.1282402","volume":"37","author":"T Koponen","year":"2007","unstructured":"Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. ACM SIGCOMM Comput. Commun. Rev. 37(4), 181\u2013192 (2007)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: DoS DDoS in named-data networking. In: Proceedings of the International Conference on Computer Communications and Networks (ICCCN) (2013)","key":"3_CR21","DOI":"10.1109\/ICCCN.2013.6614127"},{"unstructured":"Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., Zhang, L.: Interest flooding attack and countermeasures in named data networking. In: Proceedings of the IFIP Networking Conference (2013)","key":"3_CR22"},{"doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Gasti, P., Tsudik, G.: Poseidon: mitigating interest flooding DDoS attacks in named data networking. In: Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN) (2013)","key":"3_CR23","DOI":"10.1109\/LCN.2013.6761300"},{"doi-asserted-by":"crossref","unstructured":"Ghali, C., Tsudik, G., Uzun, E.: Needle in a haystack: mitigating content poisoning in named-data networking. In: The Workshop on Security of Emerging NETWORKING Technologies (2014)","key":"3_CR24","DOI":"10.14722\/sent.2014.23014"},{"unstructured":"Smetters, D., Jacobson, V.: Securing network content. Technical report, PARC (2009)","key":"3_CR25"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)","key":"3_CR26","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"4","key":"3_CR27","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J-H Cho","year":"2011","unstructured":"Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutorials"},{"doi-asserted-by":"crossref","unstructured":"Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web (WWW), pp. 891\u2013900 (2009)","key":"3_CR28","DOI":"10.1145\/1526709.1526829"},{"doi-asserted-by":"crossref","unstructured":"Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management (MDM), pp. 85\u201394 (2010)","key":"3_CR29","DOI":"10.1109\/MDM.2010.57"},{"issue":"9","key":"3_CR30","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J Lopez","year":"2010","unstructured":"Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086\u20131093 (2010)","journal-title":"Comput. Commun."},{"issue":"1","key":"3_CR31","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/j.jnca.2011.08.008","volume":"35","author":"M Omar","year":"2012","unstructured":"Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268\u2013286 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"3_CR32","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1002\/ett.1413","volume":"21","author":"T Zahariadis","year":"2010","unstructured":"Zahariadis, T., Leligou, H.C., Trakadas, P., Voliotis, S.: Trust management in wireless sensor networks. Eur. Trans. Telecommun. 21(4), 386\u2013395 (2010)","journal-title":"Eur. Trans. Telecommun."},{"doi-asserted-by":"crossref","unstructured":"Mahadevan, P., Uzun, E., Sevilla, S., et al.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information-Centric Networking. ACM (2014)","key":"3_CR33","DOI":"10.1145\/2660129.2660154"},{"issue":"3","key":"3_CR34","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2500098.2500102","volume":"43","author":"A Chaabane","year":"2013","unstructured":"Chaabane, A., Cristofaro, E.D., Kaafar, M.A., et al.: Privacy in content-oriented networking: threats and countermeasures. ACM Sigcomm Comput. Commun. Rev. 43(3), 25\u201333 (2013)","journal-title":"ACM Sigcomm Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., et al.: VoCCN: voice over content-centric networks. In: ACM ReArch 2009, December 2009","key":"3_CR35","DOI":"10.1145\/1658978.1658980"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67807-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T07:39:25Z","timestamp":1719473965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67807-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678061","9783319678078"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67807-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}