{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:34Z","timestamp":1729616674664,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/ifipnetworking.2017.8264862","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T17:40:12Z","timestamp":1516642812000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Protecting the long tail: Transparent packet security in content-centric networks"],"prefix":"10.23919","author":[{"given":"Christopher A.","family":"Wood","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"19","article-title":"On preserving privacy in content-oriented networks","author":"somaya","year":"2011","journal-title":"Proceedings of the ACM SIGCOMM Workshop on Information-centric Networking"},{"journal-title":"Netflix Internet Connection Speed Recommendations","year":"0","key":"ref38"},{"year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/586131.586133"},{"journal-title":"CCNx Key Exchange Protocol Version 1 0 Internet-Draft draft-wood-icnrg-ccnxkeyexchange-0 1 Internet Engineering Task Force","year":"2016","author":"christopher","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660154"},{"journal-title":"TRAPS performance evaluation code","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.31"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7539"},{"year":"0","key":"ref34"},{"journal-title":"CCNx access control specifications Technical report PARC","year":"2010","author":"smetters","key":"ref10"},{"journal-title":"An-dana Anonymous named data networking application","year":"2011","author":"steven","key":"ref40"},{"journal-title":"CCNx","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"ref13","first-page":"1","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","author":"dan","year":"0","journal-title":"Proc Crypto 2005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_16"},{"key":"ref15","first-page":"1","article-title":"Efficient trace and revoke schemes","author":"moni","year":"0","journal-title":"Proc FCCM 2000"},{"key":"ref16","first-page":"39","article-title":"Toward content-centric privacy in ICN: Attribute-based encryption and routing","author":"ion","year":"0","journal-title":"Proc ACM SIGCOMM ICN 2013"},{"key":"ref17","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"john","year":"0","journal-title":"Proc IEEE S&P'2007"},{"key":"ref18","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"vipul","year":"0","journal-title":"Proc of ACM CCS 2006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940528"},{"journal-title":"DNSCurve Usable Security for DNS","year":"2009","author":"bernstein","key":"ref28"},{"journal-title":"Pervasive Monitoring Is an Attack","year":"2014","author":"stephen","key":"ref4"},{"journal-title":"Hmac-based extract-and-expand key derivation function (hkdf) Technical report","year":"2010","author":"hugo","key":"ref27"},{"journal-title":"CNN Latest nsa leaks point finger at high-tech eavesdropping hub in uk","year":"2013","key":"ref3"},{"journal-title":"Simple opportunistic encryption","year":"2014","author":"bittau","key":"ref6"},{"journal-title":"Nonce-disrespecting adversaries Practical forgery attacks on GCM in TLS","year":"2016","author":"b\u00f6ck","key":"ref29"},{"key":"ref5","first-page":"403","article-title":"The case for ubiquitous transport-level encryption","author":"andrea","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref8","article-title":"File-Like ICN Collection (FLIC)","author":"christian","year":"2016","journal-title":"Internet Engineering Task Force Internet-Draft draft-tschudin-icnrg-flic-00"},{"key":"ref7","article-title":"Connection-oriented dns to improve privacy and security (extended)","author":"liang","year":"2015","journal-title":"USC\/Information Sciences Institute Tech Rep ISI-TR-2015&#x2013;695"},{"key":"ref2","first-page":"132","article-title":"Network names in content-centric networking","author":"cesar","year":"2016","journal-title":"Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking"},{"key":"ref9","first-page":"147","article-title":"Interest-based access control for content centric networks","author":"cesar","year":"2015","journal-title":"Proceedings of the 2nd International Conference on Information-Centric Networking"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","article-title":"Named data networking","volume":"44","author":"lixia","year":"2014","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145300"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810176"},{"key":"ref21","article-title":"Name-based access control","author":"yu","year":"2015","journal-title":"Relat&#x00F3;rio T&#x00E9;cnico TR NDN-0034 University of California"},{"journal-title":"Security architecture for the Internet protocol","year":"1998","author":"stephen","key":"ref42"},{"journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2","year":"2008","author":"tim","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref23","first-page":"143","article-title":"(the futility of) data privacy in content-centric networking","author":"cesar","year":"2016","journal-title":"Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"ref25","first-page":"1","author":"percival","year":"2009","journal-title":"Stronger key derivation via sequential memory-hard functions Self-published"}],"event":{"name":"2017 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2017,6,12]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253906\/8264823\/08264862.pdf?arnumber=8264862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T13:33:51Z","timestamp":1570628031000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8264862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2017.8264862","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}