Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014. ,
DOI : 10.1145/2656877.2656887
URL : https://hal.archives-ouvertes.fr/hal-01182997
A Survey of Information-Centric Networking Research, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.1024-1049, 2014. ,
DOI : 10.1109/SURV.2013.070813.00063
A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, pp.26-36, 2012. ,
DOI : 10.1109/MCOM.2012.6231276
Privacy in content-oriented networking, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, pp.25-33, 2013. ,
DOI : 10.1145/2500098.2500102
URL : https://hal.archives-ouvertes.fr/hal-00939179
Security & scalability of content-centric networking, 2010. ,
On preserving privacy in information-centric networks, Proc of SIGCOMM Workshop on ICN, 2011. ,
Cache Privacy in Named-Data Networking, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.41-51, 2013. ,
DOI : 10.1109/ICDCS.2013.12
URL : http://sprout.ics.uci.edu/papers/ICDCS2013837.pdf
Detecting router cache snooping in Named Data Networking, 2012 International Conference on ICT Convergence (ICTC), pp.714-718, 2012. ,
DOI : 10.1109/ICTC.2012.6387155
Protecting access privacy of cached contents in information centric networks, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp.173-178, 2013. ,
Enhancing cache robustness for content-centric networking, INFOCOM, 2012 Proceedings IEEE. IEEE, pp.2426-2434, 2012. ,
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking, Computer Networks, vol.57, issue.16, pp.3178-3191, 2013. ,
DOI : 10.1016/j.comnet.2013.07.034
On the possibility of mitigating content pollution in Content-Centric Networking, 39th Annual IEEE Conference on Local Computer Networks, pp.498-501, 2014. ,
DOI : 10.1109/LCN.2014.6925826
DoS and DDoS in Named Data Networking, 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp.1-7, 2013. ,
DOI : 10.1109/ICCCN.2013.6614127
URL : http://arxiv.org/pdf/1208.0952.pdf
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014. ,
DOI : 10.14722/sent.2014.23014
Check before storing, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, pp.59-67, 2013. ,
DOI : 10.1145/2500098.2500106
Efficient Content Verification in Named Data Networking, Proceedings of the 2nd International Conference on Information-Centric Networking, ICN '15, pp.109-116, 2015. ,
DOI : 10.1109/2.268884
Network-Layer Trust in Named-Data Networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.12-19, 2014. ,
DOI : 10.1145/2677046.2677049
URL : http://arxiv.org/pdf/1402.3332
An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking, The third Workshop on Name-Oriented Mobility (NOM), pp.51-65, 2015. ,
DOI : 10.1016/j.comnet.2015.01.020
Nlsr: named-data link state routing protocol, Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, pp.15-20, 2013. ,
PIT matching from unregistered remote faces, Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking, ACM-ICN '16, pp.211-212, 2016. ,
DOI : 10.1145/2984356.2985224
URL : https://hal.archives-ouvertes.fr/hal-01386809
Nfd developer's guide, 2014. ,
Caching performance of content centric networks under multi-path routing (and more), 2011. ,