{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:56:44Z","timestamp":1726329404014},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T00:00:00Z","timestamp":1592956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T00:00:00Z","timestamp":1592956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07585-8","type":"journal-article","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T14:03:20Z","timestamp":1593007400000},"page":"557-574","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking"],"prefix":"10.1007","volume":"115","author":[{"given":"Varghese Jensy","family":"Babu","sequence":"first","affiliation":[]},{"given":"M. Victor","family":"Jose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,24]]},"reference":[{"issue":"11","key":"7585_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701147","volume":"56","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Yu, Y., Zhang, H., Newberry, E., Mastorakis, S., Li, Y., et al. (2018). An overview of security support in named data networking. IEEE Communications Magazine, 56(11), 62\u201368.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"7585_CR2","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","volume":"20","author":"R Tourani","year":"2018","unstructured":"Tourani, R., Misra, S., Mick, T., & Panwar, G. (2018). Security, privacy, and access control in information-centric networking: A survey. IEEE Communications Surveys & Tutorials, 20(1), 566\u2013600.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"7585_CR3","first-page":"23","volume":"1","author":"M Lhogeshvaree","year":"2016","unstructured":"Lhogeshvaree, M. (2016). LIVE: Lightweight integrity verification for named data networking. International Journal of Engineering and Computer Science, 1(1), 23\u201334.","journal-title":"International Journal of Engineering and Computer Science"},{"key":"7585_CR4","doi-asserted-by":"crossref","unstructured":"Mori, K., Kamimoto, T., & Shigeno, H. (2015). Push-based traffic-aware cache management in named data networking. In 2015 18th International conference on network-based information systems (Vol. 1(1), pp. 32\u201345).","DOI":"10.1109\/NBiS.2015.48"},{"issue":"1","key":"7585_CR5","first-page":"1","volume":"1","author":"N Kumar","year":"2019","unstructured":"Kumar, N., Singh, A. K., & Srivastava, S. (2019). Feature selection for interest flooding attack in named data networking. International Journal of Computers and Applications, 1(1), 1\u201310.","journal-title":"International Journal of Computers and Applications"},{"issue":"1","key":"7585_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comnet.2019.05.009","volume":"158","author":"M Ehsanpour","year":"2019","unstructured":"Ehsanpour, M., Bayat, S., & Hemmatyar, A. M. (2019). An efficient and social-aware distributed in-network caching scheme in named data networks using matching theory. Computer Networks, 158(1), 175\u2013183.","journal-title":"Computer Networks"},{"issue":"1","key":"7585_CR7","first-page":"21","volume":"1","author":"W So","year":"2013","unstructured":"So, W., Narayanan, A., & Oran, D. (2013). Named data networking on a router: Fast and DoS-resistant forwarding with hash tables. Architectures for Networking and Communications Systems, 1(1), 21\u201332.","journal-title":"Architectures for Networking and Communications Systems"},{"key":"7585_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yu, Y., Ramani, S. K., Afanasyev, A., & Zhang, L. (2018). NAC: Automating access control via named data. In MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM) (Vol. 1(1), pp. 78\u201387).","DOI":"10.1109\/MILCOM.2018.8599774"},{"issue":"13","key":"7585_CR9","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/j.comnet.2012.11.026","volume":"57","author":"Y Kim","year":"2013","unstructured":"Kim, Y., & Yeom, I. (2013). Performance analysis of in-network caching for content-centric networking. Computer Networks, 57(13), 2465\u20132482.","journal-title":"Computer Networks"},{"issue":"1","key":"7585_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comnet.2015.04.005","volume":"84","author":"S Saha","year":"2015","unstructured":"Saha, S., Lukyanenko, A., & Yl\u00e4-J\u00e4\u00e4ski, A. (2015). Efficient cache availability management in information-centric networks. Computer Networks, 84(1), 32\u201345.","journal-title":"Computer Networks"},{"key":"7585_CR11","doi-asserted-by":"crossref","unstructured":"Yu, Y., Afanasyev, A., Clark, D., Claffy, K., Jacobson, V., & Zhang, L. (2015). Schematizing trust in named data networking. In: Proceedings of the 2nd international conference on information-centric networking\u2014ICN \u201815 (Vol. 1(1), pp. 45\u201356).","DOI":"10.1145\/2810156.2810170"},{"issue":"11","key":"7585_CR12","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1002\/sec.1149","volume":"8","author":"M Aamir","year":"2014","unstructured":"Aamir, M., & Zaidi, S. M. (2014). Denial-of-service in content centric (named data) networking: A tutorial and state-of-the-art survey. Security and Communication Networks, 8(11), 2037\u20132059.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"7585_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/9248654","volume":"2017","author":"R Ma","year":"2017","unstructured":"Ma, R., Cao, Z., & Wang, X. (2017). Efficient asymmetric index encapsulation scheme for anonymous content centric networking. Security and Communication Networks, 2017(1), 1\u20139.","journal-title":"Security and Communication Networks"},{"key":"7585_CR14","doi-asserted-by":"crossref","unstructured":"Ghali, C., Tsudik, G., & Uzun, E. (2014). Needle in a Haystack: Mitigating content poisoning in named-data networking. In Proceedings 2014 workshop on security of emerging networking technologies (Vol. 1(1), pp. 22\u201332).","DOI":"10.14722\/sent.2014.23014"},{"key":"7585_CR15","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Gasti, P., & Tsudik, G. (2013). Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In 38th annual IEEE conference on local computer networks (Vol. 2(1), pp. 24\u201335).","DOI":"10.1109\/LCN.2013.6761300"},{"key":"7585_CR16","doi-asserted-by":"crossref","unstructured":"Adithya, S., Gowtham Karthik, G., Hariharan, H., & Vetriselvi, V. (2016). Assuaging cache based attacks in named data network. In 2016 International conference on wireless communications, signal processing and networking (WiSPNET) (Vol. 1(1), pp. 21\u201329).","DOI":"10.1109\/WiSPNET.2016.7566256"},{"key":"7585_CR17","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Gasti, P., & Tsudik, G. (2013). Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In 38th Annual IEEE conference on local computer networks (Vol. 1(1), pp. 78\u201385).","DOI":"10.1109\/LCN.2013.6761300"},{"issue":"16","key":"7585_CR18","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.comnet.2013.07.034","volume":"57","author":"M Conti","year":"2013","unstructured":"Conti, M., Gasti, P., & Teoli, M. (2013). A lightweight mechanism for detection of cache pollution attacks in named data networking. Computer Networks, 57(16), 3178\u20133191.","journal-title":"Computer Networks"},{"key":"7585_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen, T. N., Cogranne, R., Doyen, G., & Retraint, F. (2015). Detection of interest flooding attacks in named data networking using hypothesis testing. In 2015 IEEE international workshop on information forensics and security (WIFS) (Vol. 1(1), pp. 45\u201354).","DOI":"10.1109\/WIFS.2015.7368571"},{"issue":"1","key":"7585_CR20","doi-asserted-by":"publisher","first-page":"65151","DOI":"10.1109\/ACCESS.2018.2877792","volume":"6","author":"D Kondo","year":"2018","unstructured":"Kondo, D., Silverston, T., Vassiliades, V., Tode, H., & Asami, T. (2018). Name filter: A countermeasure against information leakage attacks in named data networking. IEEE Access, 6(1), 65151\u201365170.","journal-title":"IEEE Access"},{"issue":"1","key":"7585_CR21","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.comnet.2015.01.020","volume":"80","author":"A Karami","year":"2015","unstructured":"Karami, A., & Guerrero-Zapata, M. (2015). An ANFIS-based cache replacement method for mitigating cache pollution attacks in named data networking. Computer Networks, 80(1), 51\u201365.","journal-title":"Computer Networks"},{"issue":"1","key":"7585_CR22","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1515\/ipc-2016-0001","volume":"21","author":"VG Vassilakis","year":"2016","unstructured":"Vassilakis, V. G., Wang, L., Moscholios, I. D., & Logothetis, M. D. (2016). Calculating distributed denial of service attack probability in bloom-filter based information-centric networks. Image Processing & Communications, 21(1), 7\u201323.","journal-title":"Image Processing & Communications"},{"key":"7585_CR23","doi-asserted-by":"crossref","unstructured":"Feng, T., & Kou, W. (2017). RSNC-based mechanism against content pollution attack method in NDN. In DEStech transactions on computer science and engineering (Vol. 1(smce), pp. 56\u201365).","DOI":"10.12783\/dtcse\/smce2017\/12405"},{"issue":"3","key":"7585_CR24","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MNET.2019.1800350","volume":"33","author":"R Hou","year":"2019","unstructured":"Hou, R., Han, M., Chen, J., Hu, W., Tan, X., Luo, J., et al. (2019). Theil-based countermeasure against interest flooding attacks for named data networks. IEEE Network, 33(3), 116\u2013121.","journal-title":"IEEE Network"},{"issue":"5","key":"7585_CR25","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1109\/TNET.2017.2715822","volume":"25","author":"Q Li","year":"2017","unstructured":"Li, Q., Lee, P. P., Zhang, P., Su, P., He, L., & Ren, K. (2017). Capability-based security enforcement in named data networking. IEEE\/ACM Transactions on Networking, 25(5), 2719\u20132730.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"7585_CR26","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Garc\u00eda, L. C., Dahmen, E., D\u00f6ring, M., & Klintsevich, E. (2006). CMSS\u2014An improved Merkle signature scheme. In Progress in cryptology\u2014INDOCRYPT 2006 (Vol. 1(1), pp. 349\u2013363).","DOI":"10.1007\/11941378_25"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07585-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07585-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07585-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T23:18:14Z","timestamp":1624490294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07585-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,24]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7585"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07585-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,24]]},"assertion":[{"value":"24 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}