{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:03:05Z","timestamp":1771038185933,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1145\/3405656.3418714","type":"proceedings-article","created":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T21:17:38Z","timestamp":1600809458000},"page":"136-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Named-Data Transport"],"prefix":"10.1145","author":[{"given":"Abdulazaz","family":"Albalawi","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, University of California Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"J. J.","family":"Garcia-Luna-Aceves","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, University of California Santa Cruz, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"A Survey of Security Attacks in Information-Centric Networking,\" IEEE Communications Surveys & Tutorials","author":"AbdAllah E.G.","year":"2015"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"e_1_3_2_2_3_1","volume-title":"IEEE ICNC '19","author":"Albalawi A.","year":"2019"},{"key":"e_1_3_2_2_4_1","unstructured":"A. Albalawi and J.J. Garcia-Luna-Aceves \"NDT ns-3 Simulator.\" Available at: https:\/\/github.com\/aalbalaw\/NDT.  A. Albalawi and J.J. Garcia-Luna-Aceves \"NDT ns-3 Simulator.\" Available at: https:\/\/github.com\/aalbalaw\/NDT."},{"key":"e_1_3_2_2_5_1","volume-title":"Security and Privacy Analysis of National Science Foundation Future Internet Architectures,\" IEEE Communications Surveys & Tutorials","author":"Ambrosin M.","year":"2018"},{"key":"e_1_3_2_2_6_1","volume-title":"A Brief Overview of the NEBULA Future Internet Architecture,\" ACM SIGCOMM CCR","author":"Anderson T.","year":"2014"},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. ACM SIGCOMM Workshop on Information-Centric Networking","author":"Arianfar S.","year":"2011"},{"key":"e_1_3_2_2_8_1","volume-title":"IEEE ARES '07","author":"Ariyapperuma S.","year":"2007"},{"key":"e_1_3_2_2_9_1","volume-title":"Multi-homing, Localised Addressing and Security through Naming,\" Telecommunication Systems","author":"Atkinson R.","year":"2009"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1964.1088883"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"e_1_3_2_2_12_1","volume-title":"IEEE MASCOTS '03","author":"Bartolini N.","year":"2003"},{"key":"e_1_3_2_2_13_1","volume-title":"Proc. IEEE INFOCOM Workshops '12","author":"Baugher M.","year":"2012"},{"key":"e_1_3_2_2_14_1","unstructured":"BitTorrent. http:\/\/bittorrent.com  BitTorrent. http:\/\/bittorrent.com"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"key":"e_1_3_2_2_16_1","volume-title":"Oct.","author":"Cardwell N.","year":"2016"},{"key":"e_1_3_2_2_17_1","volume-title":"March 27","author":"Cardwell N.","year":"2019"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193510"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357394"},{"key":"e_1_3_2_2_20_1","volume-title":"ACM PODC '20","author":"Carzaniga A.","year":"2000"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36257-6_6"},{"key":"e_1_3_2_2_23_1","volume-title":"Specification of Internet Transmission Control Program,\" INWG Note 72, revised","author":"Cerf V.G.","year":"1974"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2528164"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1049"},{"key":"e_1_3_2_2_26_1","unstructured":"S. Cheshire J. Graessley and R. McGuire \"Encapsulation of TCP and other Transport Protocols over UDP \" Internet Draft July 2013.  S. Cheshire J. Graessley and R. McGuire \"Encapsulation of TCP and other Transport Protocols over UDP \" Internet Draft July 2013."},{"key":"e_1_3_2_2_27_1","volume-title":"ACM ICN '14","author":"Dabirmoghaddam A.","year":"2014"},{"key":"e_1_3_2_2_28_1","first-page":"17","article-title":"Characterizing Interest Aggregation in Content-Centric Networks","volume":"2016","author":"Dabirmoghaddam A.","year":"2016","journal-title":"Proc. IFIP Networking"},{"key":"e_1_3_2_2_29_1","volume-title":"May","author":"Deering S.E.","year":"1990"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254708"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"T. Dierks \"The Transport Layer Security (TLS) Protocol Version 1.2 \" 2008.  T. Dierks \"The Transport Layer Security (TLS) Protocol Version 1.2 \" 2008.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_2_32_1","first-page":"2535","article-title":"Domain Name System Security Extensions","author":"D. E.","year":"1999","journal-title":"RFC"},{"key":"e_1_3_2_2_33_1","unstructured":"IEEE Communications Magazine 2004 At What layer Does Mobility Belong?"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2018.8401595"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486023"},{"key":"e_1_3_2_2_36_1","volume-title":"Florez-Rodriguez et al., \"Global Architecture of the COMET System,\" Seventh Framework STREP No. 248784","author":"D.","year":"2013"},{"key":"e_1_3_2_2_37_1","unstructured":"FP7 COMET project. [Online]. Available: http:\/\/www.comet-project.org\/  FP7 COMET project. [Online]. Available: http:\/\/www.comet-project.org\/"},{"key":"e_1_3_2_2_38_1","unstructured":"FP7 PSIRP project. [Online]. Available: http:\/\/www.psirp.org\/  FP7 PSIRP project. [Online]. Available: http:\/\/www.psirp.org\/"},{"key":"e_1_3_2_2_39_1","unstructured":"FP7 PURSUIT project. [Online]. Available: http:\/\/www.fp7-pursuit.eu\/PursuitWeb\/  FP7 PURSUIT project. [Online]. Available: http:\/\/www.fp7-pursuit.eu\/PursuitWeb\/"},{"key":"e_1_3_2_2_40_1","unstructured":"FP7 SAIL project. [Online]. Available: http:\/\/www.sail-project.eu\/  FP7 SAIL project. [Online]. Available: http:\/\/www.sail-project.eu\/"},{"key":"e_1_3_2_2_41_1","unstructured":"FP7 4WARD project. [Online]. Available: http:\/\/www.4ward-project.eu\/  FP7 4WARD project. [Online]. Available: http:\/\/www.4ward-project.eu\/"},{"key":"e_1_3_2_2_42_1","unstructured":"FP7 CONVERGENCE project. [Online]. Available: http:\/\/www.ictconvergence.eu\/  FP7 CONVERGENCE project. [Online]. Available: http:\/\/www.ictconvergence.eu\/"},{"key":"e_1_3_2_2_43_1","volume-title":"Towards a Quantitative Comparison of Location-Independent Network Architectures,\" ACM SIGCOMM CCR","author":"Gao Z.","year":"2014"},{"key":"e_1_3_2_2_44_1","first-page":"162","article-title":"System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks","volume":"7","author":"Garcia-Luna-Aceves J. J.","year":"2007","journal-title":"U.S. Patent"},{"key":"e_1_3_2_2_45_1","volume-title":"Proc. ACM ICN '14","author":"Garcia-Luna-Aceves J. J.","year":"2014"},{"key":"e_1_3_2_2_46_1","volume-title":"IEEE ICNC '15","author":"Garcia-Luna-Aceves J.J.","year":"2015"},{"key":"e_1_3_2_2_47_1","volume-title":"IFIP Networking '16","author":"Garcia-Luna-Aceves J.J.","year":"2016"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984359"},{"key":"e_1_3_2_2_49_1","volume-title":"Dec.","author":"Garcia-Luna-Aceves J.J.","year":"2016"},{"key":"e_1_3_2_2_50_1","volume-title":"Proc. IEEE CCN '15","author":"Garcia-Luna-Aceves J.J.","year":"2015"},{"key":"e_1_3_2_2_51_1","volume-title":"IFIP Networking '18","author":"Ghasemi C.","year":"2018"},{"key":"e_1_3_2_2_52_1","first-page":"052","article-title":"Replica Routing","volume":"6","author":"Gifford D.K.","year":"2000","journal-title":"U.S. Patent"},{"key":"e_1_3_2_2_53_1","volume-title":"USENIX Symposium on Internet Technologies and Systems","author":"Gritter M.","year":"2001"},{"key":"e_1_3_2_2_54_1","volume-title":"UDT: UDP-Based Data Transfer for High-Speed Wide Area Networks,\" Computer Networks","author":"Gu Y.","year":"2007"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810176"},{"key":"e_1_3_2_2_56_1","volume-title":"USENIX NSDI '12","author":"Han D.","year":"2012"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810173"},{"key":"e_1_3_2_2_58_1","first-page":"6698","article-title":"The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA","author":"Hoffman P.","year":"2012","journal-title":"RFC"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_3_2_2_60_1","volume-title":"Proc. ACM CoNEXT '09","author":"Jacobson V.","year":"2009"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"e_1_3_2_2_62_1","volume-title":"IETF","author":"Kohler E.","year":"2006"},{"key":"e_1_3_2_2_63_1","volume-title":"Proc. ACM SIGCOMM '07","author":"Koponen T.","year":"2007"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.323441"},{"key":"e_1_3_2_2_66_1","volume-title":"Proc. IEEE Infocom '00","author":"Levine B.N.","year":"2000"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"crossref","unstructured":"J. Li \"On peer-to-peer (P2P) content delivery \" Peer-to-Peer Netw. Appl. 2008.  J. Li \"On peer-to-peer (P2P) content delivery \" Peer-to-Peer Netw. Appl. 2008.","DOI":"10.1007\/s12083-009-0040-z"},{"key":"e_1_3_2_2_68_1","volume-title":"March","author":"Lua E.K.","year":"2004"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62572"},{"key":"e_1_3_2_2_70_1","volume-title":"Morgan Kauffman","author":"Lynch N.A.","year":"1996"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris \"Domain Names -- Implementation and Specification \" RFC 1035 Nov. 1987.  P. Mockapetris \"Domain Names -- Implementation and Specification \" RFC 1035 Nov. 1987.","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_72_1","volume-title":"ACM ICN '14","author":"Moiseenko I.","year":"2014"},{"key":"e_1_3_2_2_73_1","unstructured":"I. Moiseenko \" Fetching content in Named Data Networking with Embedded Manifests \" 2014.  I. Moiseenko \" Fetching content in Named Data Networking with Embedded Manifests \" 2014."},{"key":"e_1_3_2_2_74_1","unstructured":"M. Mosko I. Solis E. Uzun C. Wood \"CCNx 1.0 Protocol Architecture \" Xerox PARC April 2017.  M. Mosko I. Solis E. Uzun C. Wood \"CCNx 1.0 Protocol Architecture \" Xerox PARC April 2017."},{"key":"e_1_3_2_2_75_1","volume-title":"Oct.","author":"Muscariello L.","year":"2019"},{"key":"e_1_3_2_2_76_1","unstructured":"NSF Named Data Networking project. [Online]. Available: http:\/\/www.named-data.net\/  NSF Named Data Networking project. [Online]. Available: http:\/\/www.named-data.net\/"},{"key":"e_1_3_2_2_77_1","unstructured":"NS-3 based Named Data Networking (NDN) simulator [Online]. Available: https:\/\/ndnsim.net\/current\/index.html  NS-3 based Named Data Networking (NDN) simulator [Online]. Available: https:\/\/ndnsim.net\/current\/index.html"},{"key":"e_1_3_2_2_78_1","unstructured":"NSF Mobility First project. [Online]. Available:http:\/\/mobilittyfirst.winlab.rutgers.edu\/.  NSF Mobility First project. [Online]. Available:http:\/\/mobilittyfirst.winlab.rutgers.edu\/."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"e_1_3_2_2_80_1","volume-title":"Nov.","author":"Papastergiou G.","year":"2016"},{"key":"e_1_3_2_2_81_1","unstructured":"R. Peon \"Explicit proxies for HTTP\/2.0 \" IETF Informational Internet Draft 2012.  R. Peon \"Explicit proxies for HTTP\/2.0 \" IETF Informational Internet Draft 2012."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/997122.997127"},{"key":"e_1_3_2_2_83_1","volume-title":"Aug.","author":"Polese M.","year":"2019"},{"key":"e_1_3_2_2_84_1","volume-title":"IEEE Euro-NF Conference on Next Generation Internet '12","author":"Pries R.","year":"2012"},{"key":"e_1_3_2_2_85_1","first-page":"552","article-title":"System and Method for Information Object Routing in Computer Networks","volume":"7","author":"Raju J.","year":"2009","journal-title":"U. S. Patent"},{"key":"e_1_3_2_2_86_1","volume-title":"Mobility Support in IP: A Survey of Related Protocols,\" IEEE Network","author":"Saha D.","year":"2004"},{"key":"e_1_3_2_2_87_1","first-page":"185","article-title":"End-to-End Arguments in System Design","author":"Saltzer J.H.","year":"1980","journal-title":"RFC"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655143"},{"key":"e_1_3_2_2_89_1","volume-title":"Proc. AINTEC '11","author":"Seskar I.","year":"2011"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849278"},{"key":"e_1_3_2_2_91_1","volume-title":"IEEE ICNP '15","author":"Sevilla S.","year":"2015"},{"key":"e_1_3_2_2_92_1","volume-title":"IEEE ICC '17","author":"Sevilla S.","year":"2017"},{"key":"e_1_3_2_2_93_1","volume-title":"IFIP Networking '17","author":"Sevilla S.","year":"2017"},{"key":"e_1_3_2_2_94_1","unstructured":"J.M. Spinelli \"Reliable Communication on Data Links \" LIDS-P-1844 MIT Dec. 1988.  J.M. Spinelli \"Reliable Communication on Data Links \" LIDS-P-1844 MIT Dec. 1988."},{"key":"e_1_3_2_2_96_1","volume-title":"Feb.","author":"Tremblay B.","year":"2013"},{"key":"e_1_3_2_2_97_1","volume-title":"INRIA","author":"Urbani F.","year":"2011"},{"key":"e_1_3_2_2_98_1","first-page":"2136","article-title":"Dynamic Updates in the Domain Name System","author":"Vixie P.","year":"1997","journal-title":"IETF RFC"},{"key":"e_1_3_2_2_99_1","volume-title":"March","author":"Wang L.","year":"2018"},{"key":"e_1_3_2_2_100_1","volume-title":"September","author":"Westphal C.","year":"2015"},{"key":"e_1_3_2_2_101_1","volume-title":"March","author":"Wu Y.","year":"2007"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231279"},{"key":"e_1_3_2_2_103_1","volume-title":"July","author":"Xylomenos G.","year":"2013"},{"key":"e_1_3_2_2_104_1","volume-title":"April","author":"Zolfaghari B.","year":"2020"}],"event":{"name":"ICN '20: 7th ACM Conference on Information-Centric Networking","location":"Virtual Event Canada","acronym":"ICN '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 7th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3418714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3405656.3418714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:09Z","timestamp":1750195929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3418714"}},"subtitle":["An End-to-End Approach for an Information-Centric IP Internet"],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":102,"alternative-id":["10.1145\/3405656.3418714","10.1145\/3405656"],"URL":"https:\/\/doi.org\/10.1145\/3405656.3418714","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]},"assertion":[{"value":"2020-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}