Cache Privacy in Named-Data Networking, 2013 IEEE 33rd International Conference on Distributed Computing Systems, 2013. ,
DOI : 10.1109/ICDCS.2013.12
A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, pp.50-2012 ,
DOI : 10.1109/MCOM.2012.6231276
Second NetInf Architecture Description, 4WARD Deliverable D6.2, 2010. ,
On the effects of caching in access aggregation networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, 2012. ,
DOI : 10.1145/2342488.2342503
On preserving privacy in content-oriented networks, Proceedings of the ACM SIGCOMM workshop on Information-centric networking, ICN '11, 2011. ,
DOI : 10.1145/2018584.2018589
The end of the net as we know it? Deep packet inspection and internet governance, New Media & Society, vol.2, issue.4, 2011. ,
DOI : 10.1177/1461444811398031
Divertible protocols and atomic proxy cryptography, EUROCRYPT, 1998. ,
DOI : 10.1007/BFb0054122
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, CRYPTO, 2005. ,
DOI : 10.1007/11535218_16
Distributed Caching Algorithms for Content Distribution Networks, 2010 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2010.5461964
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, 2002. ,
DOI : 10.1080/15427951.2004.10129096
Securing instrumented environments over content-centric networking: the case of lighting control and NDN, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013. ,
DOI : 10.1109/INFCOMW.2013.6970725
A routing scheme for content-based networking, IEEE INFOCOM 2004, 2004. ,
DOI : 10.1109/INFCOM.2004.1356979
Privacy in content-oriented networking, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, 2013. ,
DOI : 10.1145/2500098.2500102
URL : https://hal.archives-ouvertes.fr/hal-00939179
Desinated-confirmer signature systems, US Patent, vol.5373, p.558, 1994. ,
Group Signatures, EUROCRYPT, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Content-oriented networking as a future internet infrastructure: Concepts, strengths, and application scenarios, Future Internet Technologies, 2008. ,
WAVE: Popularity-based and collaborative in-network caching for content-oriented networks, 2012 Proceedings IEEE INFOCOM Workshops, 2012. ,
DOI : 10.1109/INFCOMW.2012.6193512
A Survey on content-oriented networking for efficient content delivery, IEEE Communications Magazine, vol.49, issue.3, p.49, 2011. ,
DOI : 10.1109/MCOM.2011.5723809
Cisco Visual Networking Index: Forecast and Methodology, pp.2011-2016, 2012. ,
Secure Naming for a Network of Information, 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 2010. ,
DOI : 10.1109/INFCOMW.2010.5466661
Pollution attacks and defenses for Internet caching systems, Computer Networks, vol.52, issue.5, 2008. ,
DOI : 10.1016/j.comnet.2007.11.019
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.3297
Andana: Anonymous named data networking application, NDSS, 2012. ,
Tor: The Second-Generation Onion Router, Usenix Security, 2004. ,
Here come the ? ninjas, Ekoparty Security Conference, 2011. ,
Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352606
Invisibility and Anonymity of Undeniable and Confirmer Signatures, CT-RSA DoS and DDoS in Named-Data Networking. In ICCCN (To Appear), 2003. ,
DOI : 10.1007/3-540-36563-X_6
The most dangerous code in the world, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382204
An Architecture for Content Routing Support in the Internet, USITS, 2001. ,
Networking Named Content, CoNEXT, 2009. ,
DOI : 10.1145/1658939.1658941
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.4930
Hackers may have stolen over 200 SSL certificates. http://www.computerworld.com/s/article, 2011. ,
A Data-Oriented (and beyond) Network Architecture, SIGCOMM Computer Communication Review, vol.37, issue.4, 2007. ,
Oceanstore: an architecture for global-scale persistent storage, SIGPLAN Notes, issue.11, p.35, 2000. ,
Meta algorithms for hierarchical Web caches, IEEE International Conference on Performance, Computing, and Communications, 2004, 2004. ,
DOI : 10.1109/PCCC.2004.1395054
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures, 2012. ,
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users, LEET, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00574178
Project CCNx: Interest Message, 2012. ,
Project CCNx: Open-Source Implementation and Documentation, p.2012 ,
Probabilistic in-network caching for information-centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, 2012. ,
DOI : 10.1145/2342488.2342501
How to Leak a Secret, ASIACRYPT, 2001. ,
DOI : 10.1007/3-540-45682-1_32
A dive into the caching performance of Content Centric Networking, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012. ,
DOI : 10.1109/CAMAD.2012.6335307
URL : https://hal.archives-ouvertes.fr/hal-00796402
On sizing CCN content stores by exploiting topological information, NOMEN, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00795820
Securing Network Content, 2009. ,
LANES, Proceedings of the 2009 workshop on Re-architecting the internet, ReArch '09, 2009. ,
DOI : 10.1145/1658978.1658992
Configuring Hierarchical Squid Caches ,
Internet Caching Protocol ? RFC2186, 1997. ,
Secure naming in information-centric networks, Proceedings of the Re-Architecting the Internet Workshop on, ReARCH '10, 2010. ,
DOI : 10.1145/1921233.1921248
Host fingerprinting and tracking on the web: Privacy and security implications, NDSS, 2012. ,
Realistic storage of pending requests in Content-Centric Network routers, 2012 1st IEEE International Conference on Communications in China (ICCC), 2012. ,
DOI : 10.1109/ICCChina.2012.6356864