{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:09:02Z","timestamp":1767704942417,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:p>Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name. Using new approaches to routing named content, derived from IP, CCN simultaneously achieves scalability, security, and performance. We describe our implementation of the architecture's basic features and demonstrate its performance and resilience with secure file downloads and VoIP calls.<\/jats:p>","DOI":"10.1145\/2063176.2063204","type":"journal-article","created":{"date-parts":[[2011,12,30]],"date-time":"2011-12-30T17:01:45Z","timestamp":1325264505000},"page":"117-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":287,"title":["Networking named content"],"prefix":"10.1145","volume":"55","author":[{"given":"Van","family":"Jacobson","sequence":"first","affiliation":[{"name":"PARC, Palo Alto, CA"}]},{"given":"Diana K.","family":"Smetters","sequence":"additional","affiliation":[{"name":"PARC"}]},{"given":"James D.","family":"Thornton","sequence":"additional","affiliation":[{"name":"PARC, Palo Alto, CA"}]},{"given":"Michael","family":"Plass","sequence":"additional","affiliation":[{"name":"PARC, Palo Alto, CA"}]},{"given":"Nick","family":"Briggs","sequence":"additional","affiliation":[{"name":"PARC, Palo Alto, CA"}]},{"given":"Rebecca","family":"Braynard","sequence":"additional","affiliation":[{"name":"PARC, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2012,1]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Sep.","author":"Project","year":"2009","unstructured":"Project CCNx#8482;. http:\/\/www.ccnx.org , Sep. 2009 . Project CCNx#8482;. http:\/\/www.ccnx.org, Sep. 2009."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/353677.353678"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Adamson B. Bormann C. Handley M. Macker J. Multicast Negative-Acknowledgement (NACK) Building Blocks. IETF Nov. 2008. RFC 5401.  Adamson B. Bormann C. Handley M. Macker J. Multicast Negative-Acknowledgement (NACK) Building Blocks . IETF Nov. 2008. RFC 5401.","DOI":"10.17487\/rfc5401"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371977"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2693"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"e_1_2_1_7_1","volume-title":"et al. IDC---The expanding digital universe: A forecast of worldwide information growth through","author":"Gantz J.F.","year":"2010","unstructured":"Gantz , J.F. et al. IDC---The expanding digital universe: A forecast of worldwide information growth through 2010 . Technical report, Mar. 2007. Gantz, J.F. et al. IDC---The expanding digital universe: A forecast of worldwide information growth through 2010. Technical report, Mar. 2007."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1323"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357007"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_2_1_15_1","volume-title":"P. Host Identity Protocol Architecture","author":"Moskowitz R.","year":"2006","unstructured":"Moskowitz , R. , Nikander , P. Host Identity Protocol Architecture . IETF---Network Working Group , May 2006 . RFC 4423. Moskowitz, R., Nikander, P. Host Identity Protocol Architecture. IETF---Network Working Group, May 2006. RFC 4423."},{"key":"e_1_2_1_16_1","volume-title":"HOTSEC '06","author":"Osterweil E.","year":"2006","unstructured":"Osterweil , E. , Massey , D. , Tsendjav , B. , Zhang , B. , Zhang , L. Security through publicity . In HOTSEC '06 , 2006 . Osterweil, E., Massey, D., Tsendjav, B., Zhang, B., Zhang, L. Security through publicity. In HOTSEC '06, 2006."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.395"},{"key":"e_1_2_1_18_1","volume-title":"MIT","author":"Rivest R.L.","year":"1996","unstructured":"Rivest , R.L. , Lampson , B. SDSI---A simple distributed security infrastructure. Technical report , MIT , 1996 . Rivest, R.L., Lampson, B. SDSI---A simple distributed security infrastructure. Technical report, MIT, 1996."},{"key":"e_1_2_1_20_1","volume-title":"USENIX","author":"Wendlandt D.","year":"2008","unstructured":"Wendlandt , D. , Andersen , D. , Perrig , A. Perspectives : Improving SSH-style host authentication with multi-path probing . In USENIX , 2008 . Wendlandt, D., Andersen, D., Perrig, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX, 2008."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063176.2063204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2063176.2063204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:25Z","timestamp":1750240465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063176.2063204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1145\/2063176.2063204"],"URL":"https:\/\/doi.org\/10.1145\/2063176.2063204","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2012,1]]},"assertion":[{"value":"2012-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}