G. Acs, M. Conti, P. Gasti, C. Ghali, and G. Tsudik, Cache Privacy in Named-Data Networking, 2013 IEEE 33rd International Conference on Distributed Computing Systems, 2013.
DOI : 10.1109/ICDCS.2013.12

B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, pp.50-2012
DOI : 10.1109/MCOM.2012.6231276

M. Ambrosio, M. Marchisio, and V. Vercellone, Second NetInf Architecture Description, 4WARD Deliverable D6.2, 2010.

J. Ardelius, B. Grönvall, L. Westberg, and A. Arvidsson, On the effects of caching in access aggregation networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, 2012.
DOI : 10.1145/2342488.2342503

S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker, On preserving privacy in content-oriented networks, Proceedings of the ACM SIGCOMM workshop on Information-centric networking, ICN '11, 2011.
DOI : 10.1145/2018584.2018589

R. Bendrath and M. Mueller, The end of the net as we know it? Deep packet inspection and internet governance, New Media & Society, vol.2, issue.4, 2011.
DOI : 10.1177/1461444811398031

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, EUROCRYPT, 1998.
DOI : 10.1007/BFb0054122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, CRYPTO, 2005.
DOI : 10.1007/11535218_16

S. Borst, V. Gupta, and A. Walid, Distributed Caching Algorithms for Content Distribution Networks, 2010 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2010.5461964

A. Broder, M. Mitzenmacher, and A. Broder, Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, 2002.
DOI : 10.1080/15427951.2004.10129096

J. Burke, P. Gasti, N. Nathan, and G. Tsudik, Securing instrumented environments over content-centric networking: the case of lighting control and NDN, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013.
DOI : 10.1109/INFCOMW.2013.6970725

A. Carzaniga, M. J. Rutherford, and A. L. Wolf, A routing scheme for content-based networking, IEEE INFOCOM 2004, 2004.
DOI : 10.1109/INFCOM.2004.1356979

A. Chaabane, E. De-cristofaro, M. Kaafar, and E. Uzun, Privacy in content-oriented networking, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, 2013.
DOI : 10.1145/2500098.2500102

URL : https://hal.archives-ouvertes.fr/hal-00939179

D. Chaum, Desinated-confirmer signature systems, US Patent, vol.5373, p.558, 1994.

D. Chaum and E. Van-heyst, Group Signatures, EUROCRYPT, 1991.
DOI : 10.1007/3-540-46416-6_22

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

K. Cho, J. Choi, D. Ko, T. Kwon, and Y. Choi, Content-oriented networking as a future internet infrastructure: Concepts, strengths, and application scenarios, Future Internet Technologies, 2008.

K. Cho, M. Lee, K. Park, T. Kwon, Y. Choi et al., WAVE: Popularity-based and collaborative in-network caching for content-oriented networks, 2012 Proceedings IEEE INFOCOM Workshops, 2012.
DOI : 10.1109/INFCOMW.2012.6193512

J. Choi, J. Han, E. Cho, T. Kwon, and Y. Choi, A Survey on content-oriented networking for efficient content delivery, IEEE Communications Magazine, vol.49, issue.3, p.49, 2011.
DOI : 10.1109/MCOM.2011.5723809

I. Cisco, Cisco Visual Networking Index: Forecast and Methodology, pp.2011-2016, 2012.

C. Dannewitz, J. Golic, B. Ohlman, and B. Ahlgren, Secure Naming for a Network of Information, 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 2010.
DOI : 10.1109/INFCOMW.2010.5466661

L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic, Pollution attacks and defenses for Internet caching systems, Computer Networks, vol.52, issue.5, 2008.
DOI : 10.1016/j.comnet.2007.11.019

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.3297

S. Dibenedetto, P. Gasti, G. Tsudik, and E. Uzun, Andana: Anonymous named data networking application, NDSS, 2012.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, Usenix Security, 2004.

T. Duong and J. Rizzo, Here come the ? ninjas, Ekoparty Security Conference, 2011.

E. W. Felten and M. A. Schneider, Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352606

S. Galbraith, W. Mao, P. Gasti, G. Tsudik, E. Uzun et al., Invisibility and Anonymity of Undeniable and Confirmer Signatures, CT-RSA DoS and DDoS in Named-Data Networking. In ICCCN (To Appear), 2003.
DOI : 10.1007/3-540-36563-X_6

M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh et al., The most dangerous code in the world, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382204

M. Gritter and D. R. Cheriton, An Architecture for Content Routing Support in the Internet, USITS, 2001.

V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs et al., Networking Named Content, CoNEXT, 2009.
DOI : 10.1145/1658939.1658941

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.4930

G. Keizer, Hackers may have stolen over 200 SSL certificates. http://www.computerworld.com/s/article, 2011.

T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, K. H. Kim et al., A Data-Oriented (and beyond) Network Architecture, SIGCOMM Computer Communication Review, vol.37, issue.4, 2007.

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., Oceanstore: an architecture for global-scale persistent storage, SIGPLAN Notes, issue.11, p.35, 2000.

N. Laoutaris, S. Syntila, and I. Stavrakakis, Meta algorithms for hierarchical Web caches, IEEE International Conference on Performance, Computing, and Communications, 2004, 2004.
DOI : 10.1109/PCCC.2004.1395054

T. Lauinger, N. Laoutaris, P. Rodriguez, T. Strufe, E. Biersack et al., Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures, 2012.

S. Le-blond, P. Manils, A. Chaabane, M. A. Kaafar, C. Castelluccia et al., One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users, LEET, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00574178

R. Palo-alto, . Center, and . Inc, Project CCNx: Interest Message, 2012.

R. Palo-alto, . Center, and . Inc, Project CCNx: Open-Source Implementation and Documentation, p.2012

I. Psaras, W. K. Chai, and G. Pavlou, Probabilistic in-network caching for information-centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, 2012.
DOI : 10.1145/2342488.2342501

R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, ASIACRYPT, 2001.
DOI : 10.1007/3-540-45682-1_32

G. Rossini and D. Rossi, A dive into the caching performance of Content Centric Networking, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012.
DOI : 10.1109/CAMAD.2012.6335307

URL : https://hal.archives-ouvertes.fr/hal-00796402

G. Rossini and D. Rossi, On sizing CCN content stores by exploiting topological information, NOMEN, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00795820

D. Smetters and V. Jacobson, Securing Network Content, 2009.

K. Visala, D. Lagutin, and S. Tarkoma, LANES, Proceedings of the 2009 workshop on Re-architecting the internet, ReArch '09, 2009.
DOI : 10.1145/1658978.1658992

D. Wessels, Configuring Hierarchical Squid Caches

D. Wessels and K. Claffy, Internet Caching Protocol ? RFC2186, 1997.

W. Wong and P. Nikander, Secure naming in information-centric networks, Proceedings of the Re-Architecting the Internet Workshop on, ReARCH '10, 2010.
DOI : 10.1145/1921233.1921248

T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, Host fingerprinting and tracking on the web: Privacy and security implications, NDSS, 2012.

W. You, B. Mathieu, P. Truong, J. Peltier, and G. Simon, Realistic storage of pending requests in Content-Centric Network routers, 2012 1st IEEE International Conference on Communications in China (ICCC), 2012.
DOI : 10.1109/ICCChina.2012.6356864