{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:03:56Z","timestamp":1750831436825,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319944203"},{"type":"electronic","value":"9783319944210"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94421-0_3","type":"book-chapter","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T23:49:36Z","timestamp":1529020176000},"page":"33-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Identifying Previously Requested Content by Side-Channel Timing Attack in NDN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7285-414X","authenticated-orcid":false,"given":"Ertugrul","family":"Dogruluk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0691-1377","authenticated-orcid":false,"given":"Antonio","family":"Costa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5892-1289","authenticated-orcid":false,"given":"Joaquim","family":"Macedo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,16]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G.: Cache privacy in named-data networking. In: IEEE 33rd International Conference on Distributed Computing Systems, pp. 41\u201351. IEEE (2013)","DOI":"10.1109\/ICDCS.2013.12"},{"key":"3_CR2","unstructured":"Afanasyev, A., Shi, J., Zhang, B., Zhang, L., Moiseenko, I., Yu, Y., Shang, W., Huang, Y., Abraham, J.P., Dibenedetto, S., Fan, C., Pesavento, D., Grassi, G., Pau, G., Zhang, H., Song, T., Abraham, H.B., Crowley, P., Amin, S.O., Lehman, V., Wang, L.: NFD developer\u2019s guide. NDN. Technical report. NDN-0021 4, pp. 1\u201356 (2015)"},{"key":"3_CR3","unstructured":"April, M., Report, A., Jacobson, V., Burke, J., Zhang, L., Claffy, K., Papadopoulos, C., Wang, L., Halderman, J.A., Crowley, P.: Named Data Networking Next Phase (NDN-NP) Project May 2014\u2013April 2015 Annual Report (2015)"},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/2500098.2500102","volume":"43","author":"A Chaabane","year":"2013","unstructured":"Chaabane, A., Cristofaro, E.D.: Privacy in content-oriented networking: threats and countermeasures. ACM SIGCOMM Comput. Commun. Rev. 43(3), 26\u201333 (2013)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"3_CR5","unstructured":"DiBenedetto, S., Gasti, P.: ANDaNA: anonymous named data networking application. In: Proceedings of the Network and Distributed System Security Symposium, pp. 1\u201320 (2012)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dogruluk, E., Costa, A., Macedo, J.: Evaluating privacy attacks in named data network. In: Proceedings of the IEEE Symposium on Computers and Communication, vol. 2016, August 2016","DOI":"10.1109\/ISCC.2016.7543908"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, CCS 2000, pp. 25\u201332 (2000)","DOI":"10.1145\/352600.352606"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/2063176.2063204","volume":"55","author":"V Jacobson","year":"2012","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M., Briggs, N., Braynard, R.: Networking named content. Commun. ACM 55(1), 117 (2012)","journal-title":"Commun. ACM"},{"key":"3_CR9","unstructured":"Mastorakis, S., Afanasyev, A., Moiseenko, I., Zhang, L.: ndnSIM 2.0: a new version of the NDN simulator for NS-3, pp. 1\u20138 (2015)"},{"issue":"6","key":"3_CR10","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TDSC.2014.2382592","volume":"12","author":"A Mohaisen","year":"2015","unstructured":"Mohaisen, A., Mekky, H., Zhang, X., Xie, H., Kim, Y.: Timing attacks on access privacy in information centric networks and countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6), 675\u2013687 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"3_CR11","unstructured":"Schinzel, S.: An efficient mitigation method for timing side channels on the web. In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 1\u20136 (2011)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Spring, N., Wetherall, D.: Measuring ISP Topologies with Rocketfuel. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2002, pp. 133\u2013145 (2002)","DOI":"10.1145\/633025.633039"},{"key":"3_CR13","unstructured":"Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Conferences in Research and Practice in Information Technology Series, vol. 68, pp. 183\u2013191 (2007)"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2317307.2317319","volume":"42","author":"C Yi","year":"2012","unstructured":"Yi, C., Afanasyev, A., Wang, L., Zhang, B., Zhang, L.: Adaptive forwarding in named data networking. ACM SIGCOMM Comput. Commun. Rev. 42(3), 62 (2012)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, G., Fischer-Huebner, S., Martucci, L.a., Ehlert, S.: Revealing the calling history of SIP VoIP systems by timing attacks. In: 2009 International Conference on Availability, Reliability and Security, pp. 135\u2013142 (2009)","DOI":"10.1109\/ARES.2009.129"},{"key":"3_CR16","unstructured":"Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., Zhang, B., Tsudik, G., Massey, D., Papadopoulos, C., Wang, L., Crowley, P., Yeh, E.: Named data networking (NDN) project. NDN, Technical report NDN-0001, pp. 1\u201326, October 2010"},{"issue":"3","key":"3_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2656877.2656887","volume":"44","author":"L Zhang","year":"2014","unstructured":"Zhang, L., Jacobson, V., Diego, S., Crowley, P., Louis, S., Wang, L.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66\u201373 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."}],"container-title":["Communications in Computer and Information Science","Future Network Systems and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94421-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T14:29:17Z","timestamp":1531492157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94421-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319944203","9783319944210"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94421-0_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}