{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:22:36Z","timestamp":1725790956238},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/lanman.2018.8475052","type":"proceedings-article","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T10:18:03Z","timestamp":1540894683000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest"],"prefix":"10.1109","author":[{"given":"Paolo","family":"Gasti","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Spoiled onions: Exposing malicious Tor exit relays","author":"winter","year":"2014","journal-title":"PETS"},{"year":"0","journal-title":"DNS over HTTPS (DoH)","key":"ref38"},{"key":"ref33","article-title":"Living in a pit-less world: A case against stateful forwarding in content-centric networking","author":"ghali","year":"2015","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/SURV.2013.052213.00046"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/357830.357849"},{"key":"ref30","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"IFIP Networking"},{"key":"ref37","article-title":"The TLS protocol version 1.2","author":"dierks","year":"2008","journal-title":"IETF"},{"year":"0","journal-title":"Home page of EU GDPR","key":"ref36"},{"year":"0","journal-title":"Let&#x2019;s encrypt stats","key":"ref35"},{"key":"ref34","article-title":"Neutralizing interest flooding attacks in named data networks using cryptographic route tokens","author":"alston","year":"2016","journal-title":"NCA"},{"key":"ref10","article-title":"Securing network content","author":"smetters","year":"2009","journal-title":"PARC Tech Rep"},{"key":"ref11","article-title":"Flexible end-to-end content security in ccn","author":"wood","year":"2014","journal-title":"CCNC"},{"key":"ref12","article-title":"An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges","author":"da silva","year":"2015","journal-title":"CCNC"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/2534169.2491717","article-title":"Toward content-centric privacy in icn: Attribute-based encryption and routing","author":"ion","year":"2013","journal-title":"ACM SIGCOMM ICN Workshop"},{"key":"ref14","article-title":"Cache privacy in named-data networking","author":"acs","year":"2013","journal-title":"ICDCS"},{"key":"ref15","article-title":"Violating consumer anonymity: Geo-locating nodes in named data networking","author":"compagno","year":"2015","journal-title":"ACNS"},{"key":"ref16","article-title":"Privacy-aware caching in information-centric networking","author":"acs","year":"2017","journal-title":"IEEE Trans Dependable and Secure Computing"},{"key":"ref17","article-title":"Protecting access privacy of cached contents in information centric networks","author":"mohaisen","year":"2013","journal-title":"ASIACCS"},{"key":"ref18","article-title":"Protecting router cache privacy in named data networking","author":"gao","year":"2015","journal-title":"ICC"},{"key":"ref19","article-title":"Covert ephemeral communication in named data networking","author":"ambrosin","year":"2014","journal-title":"ASIACCS"},{"key":"ref28","article-title":"Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking","author":"compagno","year":"2013","journal-title":"LCN"},{"key":"ref4","article-title":"Needle in a haystack: Mitigating content poisoning in named-data networking","author":"ghali","year":"2014","journal-title":"Proc of NDSS workshop on SENT"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/2018584.2018596","article-title":"A reality check for content centric networking","author":"perino","year":"2011","journal-title":"ACM SIGCOMM ICN Workshop"},{"key":"ref3","article-title":"Dos and ddos in named data networking","author":"gasti","year":"2013","journal-title":"ICCCN"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2677046.2677049"},{"key":"ref29","article-title":"Mitigate ddos attacks in ndn by interest traceback","author":"dai","year":"2013","journal-title":"INFOCOM Workshops"},{"key":"ref5","article-title":"Self-verifying names for read-only named data","author":"baugher","year":"2012","journal-title":"INFOCOM Workshops"},{"key":"ref8","article-title":"Named-data security scheme for named data networking","author":"hamdane","year":"2012","journal-title":"Network of the Future (NOF)"},{"key":"ref7","article-title":"Towards name-based trust and security for contentcentric network","author":"zhang","year":"2011","journal-title":"ICNP"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/COMST.2018.2798280"},{"key":"ref9","article-title":"Snamp: Secure namespace mapping to scale ndn forwarding","author":"afanasyev","year":"2015","journal-title":"INFOCOM Workshops"},{"year":"0","journal-title":"State of ipv6 deployment 2017","key":"ref1"},{"key":"ref20","article-title":"ANDaNA: Anonymous named data networking application","author":"dibenedetto","year":"2012","journal-title":"NDSS"},{"key":"ref22","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref21","article-title":"Ac3n: Anonymous communication in content-centric networking","author":"tsudik","year":"2016","journal-title":"CCNC"},{"key":"ref24","article-title":"An on-demand multi-path interest forwarding strategy for content retrievals in ccn","author":"udugama","year":"2014","journal-title":"NOMS"},{"key":"ref23","article-title":"Scalable ndn forwarding: Concepts, issues and principles","author":"yuan","year":"2012","journal-title":"ICCCN"},{"key":"ref26","article-title":"Named data networking (ndn) project","author":"zhang","year":"2010","journal-title":"RelatorioTecnico NDN-0001"},{"key":"ref25","article-title":"Ospfn: An ospf based routing protocol for named data networking","author":"wang","year":"2012","journal-title":"Technical Report NDN-0003"}],"event":{"name":"2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","start":{"date-parts":[[2018,6,25]]},"location":"Washington, DC","end":{"date-parts":[[2018,6,27]]}},"container-title":["2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466558\/8475044\/08475052.pdf?arnumber=8475052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:57:38Z","timestamp":1643191058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8475052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/lanman.2018.8475052","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}