{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:02:15Z","timestamp":1768413735194,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16DII111"],"award-info":[{"award-number":["16DII111"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,6]]},"DOI":"10.1145\/3517212.3558085","type":"proceedings-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T18:33:41Z","timestamp":1662489221000},"page":"67-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SoK: Public key and namespace management in NDN"],"prefix":"10.1145","author":[{"given":"Pouyan Fotouhi","family":"Tehrani","sequence":"first","affiliation":[{"name":"Fraunhofer FOKUS, Berlin, Germany"}]},{"given":"Eric","family":"Osterweil","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"C. Adams S. Farrell T. Kause and T. Mononen. 2005. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4210.txt  C. Adams S. Farrell T. Kause and T. Mononen. 2005. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4210.txt","DOI":"10.17487\/rfc4210"},{"key":"e_1_3_2_1_2_1","volume-title":"Comparison of Naming Schema in ICN. In 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN '16)","author":"Adhatarao Sripriya S","year":"2016","unstructured":"Sripriya S Adhatarao , Jiachen Chen , Mayutan Arumaithurai , Xiaoming Fu , and K K Ramakrishnan . 2016 . Comparison of Naming Schema in ICN. In 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN '16) . IEEE, Piscataway, NJ, USA, 1--6. Sripriya S Adhatarao, Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, and K K Ramakrishnan. 2016. Comparison of Naming Schema in ICN. In 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN '16). IEEE, Piscataway, NJ, USA, 1--6."},{"key":"e_1_3_2_1_4_1","volume-title":"NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN '17)","author":"Afanasyev Alexander","year":"2017","unstructured":"Alexander Afanasyev , Xiaoke Jiang , Yingdi Yu , Jiewen Tan , Yumin Xia , Allison Mankin , and Lixia Zhang . 2017 . NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN '17) . IEEE, Piscataway, NJ, USA, 1--9. Alexander Afanasyev, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, and Lixia Zhang. 2017. NDNS: A DNS-Like Name Service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN '17). IEEE, Piscataway, NJ, USA, 1--9."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660148"},{"key":"e_1_3_2_1_7_1","volume-title":"Apple Root Certificate Program","year":"2022","unstructured":"Apple. 2022. Apple Root Certificate Program . Apple Inc . https:\/\/www.apple.com\/certificateauthority\/ca_program.html [Online; accessed: 2022 -05-19]. Apple. 2022. Apple Root Certificate Program. Apple Inc. https:\/\/www.apple.com\/certificateauthority\/ca_program.html [Online; accessed: 2022-05-19]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4033.txt  R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4033.txt","DOI":"10.17487\/rfc4033"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810163"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125733"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"e_1_3_2_1_12_1","article-title":"Governance in Namespaces","volume":"36","author":"Bechtold Stefan","year":"2003","unstructured":"Stefan Bechtold . 2003 . Governance in Namespaces . SSRN Electronic Journal 36 , 3 (2003), 82 pages. Stefan Bechtold. 2003. Governance in Namespaces. SSRN Electronic Journal 36, 3 (2003), 82 pages.","journal-title":"SSRN Electronic Journal"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369740.3369790"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 3rd ACM Conference on Information-Centric Networking (ICN '16)","author":"Chen Jiachen","unstructured":"Jiachen Chen , Mayutan Arumaithurai , Xiaoming Fu , and K. K. Ramakrishnan . 2016. CNS: Content-oriented Notification Service for Managing Disasters . In Proceedings of the 3rd ACM Conference on Information-Centric Networking (ICN '16) . Association for Computing Machinery, New York, NY, USA, 122--131. Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, and K. K. Ramakrishnan. 2016. CNS: Content-oriented Notification Service for Managing Disasters. In Proceedings of the 3rd ACM Conference on Information-Centric Networking (ICN '16). Association for Computing Machinery, New York, NY, USA, 122--131."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01558663"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984374"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"A. Cooper and J. Postel. 1992. The US Domain. RFC 1386. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1386.txt  A. Cooper and J. Postel. 1992. The US Domain. RFC 1386. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1386.txt","DOI":"10.17487\/rfc1386"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF. http:\/\/tools.ietf.org\/rfc\/rfc5280.txt  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF. http:\/\/tools.ietf.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. Farrell D. Kutscher C. Dannewitz B. Ohlman A. Keranen and P. Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6920.txt  S. Farrell D. Kutscher C. Dannewitz B. Ohlman A. Keranen and P. Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6920.txt","DOI":"10.17487\/rfc6920"},{"key":"e_1_3_2_1_21_1","volume-title":"Federal Public Key Infrastructure Guide Introduction - Trust Stores. https:\/\/github.com\/GSA\/ficam-playbooks\/blob\/88ad6fff953521fbd8ee762ece59c6be5db750ef\/_fpki\/3_fpki_truststores.md [Online","author":"General Services Administration","year":"2022","unstructured":"General Services Administration . 2022. Federal Public Key Infrastructure Guide Introduction - Trust Stores. https:\/\/github.com\/GSA\/ficam-playbooks\/blob\/88ad6fff953521fbd8ee762ece59c6be5db750ef\/_fpki\/3_fpki_truststores.md [Online ; accessed: 2022 -05-19]. General Services Administration. 2022. Federal Public Key Infrastructure Guide Introduction - Trust Stores. https:\/\/github.com\/GSA\/ficam-playbooks\/blob\/88ad6fff953521fbd8ee762ece59c6be5db750ef\/_fpki\/3_fpki_truststores.md [Online; accessed: 2022-05-19]."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"e_1_3_2_1_23_1","unstructured":"Global Commission on Internet Governance. 2017. Who Runs the Internet?: The Global Multi-stakeholder Model of Internet Governance.  Global Commission on Internet Governance. 2017. Who Runs the Internet?: The Global Multi-stakeholder Model of Internet Governance."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810176"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482974"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357404"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"P. Hallam-Baker R. Stradling and J. Hoffman-Andrews. 2019. DNS Certification Authority Authorization (CAA) Resource Record. RFC 8659. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8659.txt  P. Hallam-Baker R. Stradling and J. Hoffman-Andrews. 2019. DNS Certification Authority Authorization (CAA) Resource Record. RFC 8659. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8659.txt","DOI":"10.17487\/RFC8659"},{"key":"e_1_3_2_1_28_1","volume-title":"Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi","author":"Hamdane Balkis","year":"2017","unstructured":"Balkis Hamdane , Rihab Boussada , Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi . 2017 . Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking. In 2017 IEEE 26th International Conference on Enabling Technologies : Infrastructure for Collaborative Enterprises (WETICE '17). IEEE, Piscataway, NJ, USA , 226--231. Balkis Hamdane, Rihab Boussada, Mohamed Elhoucine Elhdhili, and Sihem Guemara El Fatmi. 2017. Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking. In 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '17). IEEE, Piscataway, NJ, USA, 226--231."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2nd ACM Conference on Information-Centric Networking","author":"Hemmati Ehsan","unstructured":"Ehsan Hemmati and J.J. Garcia-Luna-Aceves . 2015. A New Approach to Name-Based Link-State Routing for Information-Centric Networks . In Proceedings of the 2nd ACM Conference on Information-Centric Networking ( San Francisco, CA, USA) (ICN '15). Association for Computing Machinery, New York, NY, USA, 29--38. Ehsan Hemmati and J.J. Garcia-Luna-Aceves. 2015. A New Approach to Name-Based Link-State Routing for Information-Centric Networks. In Proceedings of the 2nd ACM Conference on Information-Centric Networking (San Francisco, CA, USA) (ICN '15). Association for Computing Machinery, New York, NY, USA, 29--38."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and J. Schlyter. 2012. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6698.txt  P. Hoffman and J. Schlyter. 2012. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6698.txt","DOI":"10.17487\/rfc6698"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491231"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063490"},{"key":"e_1_3_2_1_33_1","volume-title":"Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Standard","author":"International Organization for Standardization. 2019.","unstructured":"International Organization for Standardization. 2019. Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Standard . International Telecommunication Union . International Organization for Standardization. 2019. Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Standard. International Telecommunication Union."},{"key":"e_1_3_2_1_34_1","first-page":"2020","article-title":"Information technology - Open Systems Interconnection - The Directory - Part 1: Overview of concepts, models and services","volume":"9594","author":"International Organization for Standardization.","year":"2020","unstructured":"International Organization for Standardization. 2020 . Information technology - Open Systems Interconnection - The Directory - Part 1: Overview of concepts, models and services . Standard ISO\/IEC 9594-1 : 2020 . International Organization for Standardization, Geneva, CH. International Organization for Standardization. 2020. Information technology - Open Systems Interconnection - The Directory - Part 1: Overview of concepts, models and services. Standard ISO\/IEC 9594-1:2020. International Organization for Standardization, Geneva, CH.","journal-title":"Standard ISO\/IEC"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies","author":"Jacobson Van","unstructured":"Van Jacobson , Diana K. Smetters , James D. Thornton , Michael F. Plass , Nicholas H. Briggs , and Rebecca L. Braynard . 2009. Networking Named Content . In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies ( Rome, Italy) (CoNEXT '09). Association for Computing Machinery, New York, NY, USA, 1--12. Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. 2009. Networking Named Content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (Rome, Italy) (CoNEXT '09). Association for Computing Machinery, New York, NY, USA, 1--12."},{"key":"e_1_3_2_1_36_1","volume-title":"PKI Trust Models","author":"Just Mike","unstructured":"Mike Just . 2011. PKI Trust Models . Springer US , Boston, MA , 936--939. Mike Just. 2011. PKI Trust Models. Springer US, Boston, MA, 936--939."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.807016"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125738"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267956"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357395"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125727"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984360"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482975"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482970"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Steve Lloyd and Carlisle Adams. 2011. Key Management. Springer US Boston MA 683--688.  Steve Lloyd and Carlisle Adams. 2011. Key Management. Springer US Boston MA 683--688.","DOI":"10.1007\/978-1-4419-5906-5_85"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 1st International Conference on Information-centric Networking (ICN '14)","author":"Mahadevan Priya","unstructured":"Priya Mahadevan , Ersin Uzun , Spencer Sevilla , and J.J. Garcia-Luna-Aceves . 2014. CCN-KRS: A Key Resolution Service for CCN . In Proceedings of the 1st International Conference on Information-centric Networking (ICN '14) . Association for Computing Machinery, New York, New York, USA, 97--106. Priya Mahadevan, Ersin Uzun, Spencer Sevilla, and J.J. Garcia-Luna-Aceves. 2014. CCN-KRS: A Key Resolution Service for CCN. In Proceedings of the 1st International Conference on Information-centric Networking (ICN '14). Association for Computing Machinery, New York, New York, USA, 97--106."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311888"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984378"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"P.V. Mockapetris. 1987. Domain names - concepts and facilities. RFC 1034. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1034.txt  P.V. Mockapetris. 1987. Domain names - concepts and facilities. RFC 1034. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1034.txt","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984357"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357399"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"S. Morris J. Ihren J. Dickinson and W. Mekking. 2015. DNSSEC Key Rollover Timing Considerations. RFC 7583. IETF. http:\/\/tools.ietf.org\/rfc\/rfc7583.txt  S. Morris J. Ihren J. Dickinson and W. Mekking. 2015. DNSSEC Key Rollover Timing Considerations. RFC 7583. IETF. http:\/\/tools.ietf.org\/rfc\/rfc7583.txt","DOI":"10.17487\/RFC7583"},{"key":"e_1_3_2_1_54_1","volume-title":"Common CA Database","year":"2022","unstructured":"Mozilla. 2022. Common CA Database . Mozilla Foundation . https:\/\/www.ccadb.org [Online; accessed: 2022 -05-19]. Mozilla. 2022. Common CA Database. Mozilla Foundation. https:\/\/www.ccadb.org [Online; accessed: 2022-05-19]."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267970"},{"key":"e_1_3_2_1_56_1","volume-title":"NDN Certificate Format Version 2.0. NDN Project Team. https:\/\/github.com\/named-data\/ndn-cxx\/blob\/4999b2eddd7da10bc934a27f2f151e37f2095765\/docs\/specs\/certificate.rst Online","author":"Networking Project Named Data","year":"2022","unstructured":"Named Data Networking Project . 2021. NDN Certificate Format Version 2.0. NDN Project Team. https:\/\/github.com\/named-data\/ndn-cxx\/blob\/4999b2eddd7da10bc934a27f2f151e37f2095765\/docs\/specs\/certificate.rst Online ; accessed 2022 -05-03. Named Data Networking Project. 2021. NDN Certificate Format Version 2.0. NDN Project Team. https:\/\/github.com\/named-data\/ndn-cxx\/blob\/4999b2eddd7da10bc934a27f2f151e37f2095765\/docs\/specs\/certificate.rst Online; accessed 2022-05-03."},{"key":"e_1_3_2_1_57_1","volume-title":"NDN Packet Format Specification 0.3 - Key-Locator. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/acaccafd710a306df405e4b40302080d729b4ade\/signature.rst#keylocator Online","author":"Networking Project Named Data","year":"2022","unstructured":"Named Data Networking Project . 2021. NDN Packet Format Specification 0.3 - Key-Locator. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/acaccafd710a306df405e4b40302080d729b4ade\/signature.rst#keylocator Online ; accessed 2022 -05-03. Named Data Networking Project. 2021. NDN Packet Format Specification 0.3 - Key-Locator. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/acaccafd710a306df405e4b40302080d729b4ade\/signature.rst#keylocator Online; accessed 2022-05-03."},{"key":"e_1_3_2_1_58_1","volume-title":"NDN Packet Format Specification 0.3 - NDN Name Format. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/23e340cb138afa95ee228dffb8c50870eea26633\/name.rst#ndn-name-format Online","author":"Networking Project Named Data","year":"2022","unstructured":"Named Data Networking Project . 2021. NDN Packet Format Specification 0.3 - NDN Name Format. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/23e340cb138afa95ee228dffb8c50870eea26633\/name.rst#ndn-name-format Online ; accessed 2022 -05-03. Named Data Networking Project. 2021. NDN Packet Format Specification 0.3 - NDN Name Format. NDN Project Team. https:\/\/github.com\/named-data\/NDN-packet-spec\/blob\/23e340cb138afa95ee228dffb8c50870eea26633\/name.rst#ndn-name-format Online; accessed 2022-05-03."},{"key":"e_1_3_2_1_59_1","volume-title":"NFD - Control Command. https:\/\/redmine.named-data.net\/projects\/nfd\/wiki\/ControlCommand\/52 [Online","author":"Project Team NDN","year":"2022","unstructured":"NDN Project Team . 2020. NFD - Control Command. https:\/\/redmine.named-data.net\/projects\/nfd\/wiki\/ControlCommand\/52 [Online ; accessed: 2022 -05-17]. NDN Project Team. 2020. NFD - Control Command. https:\/\/redmine.named-data.net\/projects\/nfd\/wiki\/ControlCommand\/52 [Online; accessed: 2022-05-17]."},{"key":"e_1_3_2_1_60_1","volume-title":"NDN Technical Memo: Naming Conventions. techreport NDN-0022","author":"Project Team NDN","year":"2021","unstructured":"NDN Project Team . 2021 . NDN Technical Memo: Naming Conventions. techreport NDN-0022 . NDN Project Team. 2021. NDN Technical Memo: Naming Conventions. techreport NDN-0022."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357397"},{"key":"e_1_3_2_1_62_1","volume-title":"Thomas C. Schmidt, and Matthias W\u00e4hlisch.","author":"Osterweil Eric","year":"2022","unstructured":"Eric Osterweil , Pouyan Fotouhi Tehrani , Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2022 . From the Beginning : Key Transitions in the First 15 Years of DNSSEC. IEEE Transactions on Network and Service Management (2022). [Early Access ]. Eric Osterweil, Pouyan Fotouhi Tehrani, Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2022. From the Beginning: Key Transitions in the First 15 Years of DNSSEC. IEEE Transactions on Network and Service Management (2022). [Early Access]."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357393"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167358"},{"key":"e_1_3_2_1_65_1","volume-title":"Rivest and Butler Lampson","author":"Ronald","year":"1996","unstructured":"Ronald L. Rivest and Butler Lampson . 1996 . SDSI - A Simple Distributed Security Infrastructure . Ronald L. Rivest and Butler Lampson. 1996. SDSI - A Simple Distributed Security Infrastructure."},{"key":"e_1_3_2_1_66_1","volume-title":"Operating Systems - An Advanced Course","author":"Saltzer J H","unstructured":"J H Saltzer . 1978. Naming and Binding of Objects . In Operating Systems - An Advanced Course . Springer, Berlin , Heidelberg , 99--208. J H Saltzer. 1978. Naming and Binding of Objects. In Operating Systems - An Advanced Course. Springer, Berlin, Heidelberg, 99--208."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6960.txt  S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6960.txt","DOI":"10.17487\/rfc6960"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278562"},{"key":"e_1_3_2_1_69_1","volume-title":"Advances in Cryptology","author":"Shamir Adi","unstructured":"Adi Shamir . 1985. Identity-Based Cryptosystems and Signature Schemes . In Advances in Cryptology , George Robert Blakley and David Chaum (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 47--53. Adi Shamir. 1985. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology, George Robert Blakley and David Chaum (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 47--53."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"M. StJohns. 2007. Automated Updates of DNS Security (DNSSEC) Trust Anchors. RFC 5011. IETF. http:\/\/tools.ietf.org\/rfc\/rfc5011.txt  M. StJohns. 2007. Automated Updates of DNS Security (DNSSEC) Trust Anchors. RFC 5011. IETF. http:\/\/tools.ietf.org\/rfc\/rfc5011.txt","DOI":"10.17487\/rfc5011"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633033"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357417"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357401"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357400"},{"key":"e_1_3_2_1_76_1","volume-title":"Emergency Key Rollover in DNSSEC. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society","author":"Wang Zheng","year":"2014","unstructured":"Zheng Wang and Liyuan Xiao . 2014 . Emergency Key Rollover in DNSSEC. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society , Los Alamitos, CA, USA, 598--604. Zheng Wang and Liyuan Xiao. 2014. Emergency Key Rollover in DNSSEC. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society, Los Alamitos, CA, USA, 598--604."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460417.3482977"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517212.3558079"},{"key":"e_1_3_2_1_79_1","unstructured":"Yingdi Yu. 2015. Public Key Management in Named Data Networking. techreport NDN-0029. UCLA.  Yingdi Yu. 2015. Public Key Management in Named Data Networking. techreport NDN-0029. UCLA."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125724"},{"key":"e_1_3_2_1_82_1","volume-title":"NDNFit: An Open mHealth Application Built on Named Data Networking. Ph. D. Dissertation","author":"Zhang Haitao","unstructured":"Haitao Zhang . 2018. NDNFit: An Open mHealth Application Built on Named Data Networking. Ph. D. Dissertation . University of California Los Angeles. Haitao Zhang. 2018. NDNFit: An Open mHealth Application Built on Named Data Networking. Ph. D. Dissertation. University of California Los Angeles."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984379"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_1_85_1","volume-title":"Dmitri Krioukov, Dan Massey, Christos Papadopoulos, Tarek Abdelzaher, Lan Wang, Patrick Crowley, and Edmund Yeh.","author":"Zhang Lixia","year":"2010","unstructured":"Lixia Zhang , Deborah Estrin , Burke Jeffrey , Van Jacobso , James D. Thornton , Diana K. Smetters , Beichuan Zhang , Gene Tsudik , kc claffy , Dmitri Krioukov, Dan Massey, Christos Papadopoulos, Tarek Abdelzaher, Lan Wang, Patrick Crowley, and Edmund Yeh. 2010 . Named Data Networking (NDN) Project . Technical Report NDN-0001. Lixia Zhang, Deborah Estrin, Burke Jeffrey, Van Jacobso, James D. Thornton, Diana K. Smetters, Beichuan Zhang, Gene Tsudik, kc claffy, Dmitri Krioukov, Dan Massey, Christos Papadopoulos, Tarek Abdelzaher, Lan Wang, Patrick Crowley, and Edmund Yeh. 2010. Named Data Networking (NDN) Project. Technical Report NDN-0001."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057193"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089053"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267959"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701147"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733578"}],"event":{"name":"ICN '22: 9th ACM Conference on Information-Centric Networking","location":"Osaka Japan","acronym":"ICN '22","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 9th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517212.3558085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517212.3558085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:30Z","timestamp":1750188690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517212.3558085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,6]]},"references-count":88,"alternative-id":["10.1145\/3517212.3558085","10.1145\/3517212"],"URL":"https:\/\/doi.org\/10.1145\/3517212.3558085","relation":{},"subject":[],"published":{"date-parts":[[2022,9,6]]},"assertion":[{"value":"2022-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}