{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:53:10Z","timestamp":1773075190642,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T00:00:00Z","timestamp":1506384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Graduate Research Fellowship","award":["DGE-1321846"],"award-info":[{"award-number":["DGE-1321846"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,26]]},"DOI":"10.1145\/3125719.3125723","type":"proceedings-article","created":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T20:29:27Z","timestamp":1505852967000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["When encryption is not enough"],"prefix":"10.1145","author":[{"given":"Cesar","family":"Ghali","sequence":"first","affiliation":[{"name":"University of California Irvine"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California Irvine"}]},{"given":"Christopher A.","family":"Wood","sequence":"additional","affiliation":[{"name":"University of California Irvine"}]}],"member":"320","published-online":{"date-parts":[[2017,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Privacy-Aware Caching in Information-Centric Networking","volume":"99","author":"Acs G.","year":"2017","unstructured":"G. Acs , M. Conti , P. Gasti , C. Ghali , G. Tsudik , and C. Wood . 2017 . Privacy-Aware Caching in Information-Centric Networking . IEEE Transactions on Dependable and Secure Computing PP , 99 (2017), 1 -- 1 . G. Acs, M. Conti, P. Gasti, C. Ghali, G. Tsudik, and C. Wood. 2017. Privacy-Aware Caching in Information-Centric Networking. IEEE Transactions on Dependable and Secure Computing PP, 99 (2017), 1--1.","journal-title":"IEEE Transactions on Dependable and Secure Computing PP"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2013.6708095"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Tim Berners-Lee Roy Fielding and Larry Masinter. 1998. RFC 2396: Uniform resource identifiers (URI): generic syntax. (1998).   Tim Berners-Lee Roy Fielding and Larry Masinter. 1998. RFC 2396: Uniform resource identifiers (URI): generic syntax. (1998).","DOI":"10.17487\/rfc2396"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500102"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916637"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288477"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2009.2015983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810161"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810174"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994639"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491237"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683976"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.012"},{"key":"e_1_3_2_1_16_1","volume-title":"An Encryption-Based Access Control Framework for Content-Centric Networking. IFIP Networking","author":"Kurihara Jun","year":"2015","unstructured":"Jun Kurihara , Christopher Wood , and Ersin Uzuin .2015. An Encryption-Based Access Control Framework for Content-Centric Networking. IFIP Networking ( 2015 ). Jun Kurihara, Christopher Wood, and Ersin Uzuin.2015. An Encryption-Based Access Control Framework for Content-Centric Networking. IFIP Networking (2015)."},{"key":"e_1_3_2_1_17_1","unstructured":"Tobias Lauinger. 2010. Security & scalability of content-centric networking. Master's thesis. Technische Universit\u00e4t.  Tobias Lauinger. 2010. Security & scalability of content-centric networking. Master's thesis. Technische Universit\u00e4t."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378956.2378966"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WWWJ.0000028182.49617.09"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Aziz Mohaisen Hesham Mekky Xiaobing Zhang and others. 2015. Timing attacks on access privacy in information centric networks and countermeasures. (2015).  Aziz Mohaisen Hesham Mekky Xiaobing Zhang and others. 2015. Timing attacks on access privacy in information centric networks and countermeasures. (2015).","DOI":"10.1109\/TDSC.2014.2382592"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484335"},{"key":"e_1_3_2_1_24_1","volume-title":"Wood","author":"Mosko Marc","year":"2017","unstructured":"Marc Mosko , Ignacio Solis , and Christopher A . Wood . 2017 . CCNx Semantics. Internet-Draft draft-irtf-icnrg-ccnxsemantics-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-irtf-icnrg-ccnxsemantics-04 Work in Progress . Marc Mosko, Ignacio Solis, and Christopher A. Wood. 2017. CCNx Semantics. Internet-Draft draft-irtf-icnrg-ccnxsemantics-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-irtf-icnrg-ccnxsemantics-04 Work in Progress."},{"key":"e_1_3_2_1_25_1","volume-title":"Wood.2017. Mobile Sessions in Content-Centric Networks. IFIP Networking","author":"Mosko Marc","year":"2017","unstructured":"Marc Mosko , Ersin Uzun , and Christopher A . Wood.2017. Mobile Sessions in Content-Centric Networks. IFIP Networking ( 2017 ). Marc Mosko, Ersin Uzun, and Christopher A. Wood.2017. Mobile Sessions in Content-Centric Networks. IFIP Networking (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018593"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_28_1","volume-title":"Wood","author":"Oliviera-Nunes Ivan","year":"2017","unstructured":"Ivan Oliviera-Nunes , Gene Tsudik , and Christopher A . Wood . 2017 . Namespace Tunnels in Content-Centric Networks . to appear in 42nd Annual IEEE Conference on Local Computer Networks (2017). Ivan Oliviera-Nunes, Gene Tsudik, and Christopher A. Wood. 2017. Namespace Tunnels in Content-Centric Networks. to appear in 42nd Annual IEEE Conference on Local Computer Networks (2017)."},{"key":"e_1_3_2_1_29_1","unstructured":"PARC. 2017. ccns3Sim: CCNx Module for NS3. (2017). https:\/\/github.com\/parc\/ccns3sim  PARC. 2017. ccns3Sim: CCNx Module for NS3. (2017). https:\/\/github.com\/parc\/ccns3sim"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833684"},{"key":"e_1_3_2_1_31_1","unstructured":"Diana K. Smetters Philippe Golle and J. D. Thornton. 2010. CCNx Access Control Specifications. Technical Report. PARC.  Diana K. Smetters Philippe Golle and J. D. Thornton. 2010. CCNx Access Control Specifications. Technical Report. PARC."},{"key":"e_1_3_2_1_32_1","unstructured":"Christopher A. Wood. 2017. CCN eavesdropper simulator. (2017). https:\/\/github.com\/chris-wood\/ccn-eavesdropper-simulator  Christopher A. Wood. 2017. CCN eavesdropper simulator. (2017). https:\/\/github.com\/chris-wood\/ccn-eavesdropper-simulator"},{"key":"e_1_3_2_1_33_1","volume-title":"Protecting the Long Tail: Transparent Packet Security in Content-Centric Networks. IFIP Networking","author":"Wood Christopher A.","year":"2017","unstructured":"Christopher A. Wood . 2017. Protecting the Long Tail: Transparent Packet Security in Content-Centric Networks. IFIP Networking ( 2017 ). Christopher A. Wood. 2017. Protecting the Long Tail: Transparent Packet Security in Content-Centric Networks. IFIP Networking (2017)."},{"key":"e_1_3_2_1_34_1","volume-title":"Wood and Ersin Uzun","author":"Christopher","year":"2014","unstructured":"Christopher A. Wood and Ersin Uzun . 2014 . Flexible End-to-End Content Security in CCN. In CCNC. Christopher A. Wood and Ersin Uzun. 2014. Flexible End-to-End Content Security in CCN. In CCNC."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"}],"event":{"name":"ICN '17: 4th International Conference on Information-Centric Networking","location":"Berlin Germany","acronym":"ICN '17","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 4th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125719.3125723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125719.3125723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:54Z","timestamp":1750212834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125719.3125723"}},"subtitle":["privacy attacks in content-centric networking"],"short-title":[],"issued":{"date-parts":[[2017,9,26]]},"references-count":34,"alternative-id":["10.1145\/3125719.3125723","10.1145\/3125719"],"URL":"https:\/\/doi.org\/10.1145\/3125719.3125723","relation":{},"subject":[],"published":{"date-parts":[[2017,9,26]]},"assertion":[{"value":"2017-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}