[1] |
XYLOMENOS G , VERVERIDIS C , SIRIS V ,et al. A survey of information-centric networking research[J]. IEEE Communications Surveys & Tutorials, 2014,16: 1024-1049.
|
[2] |
JACOBSON V , SMETTERS D K , THORNTON J D ,et al. Networking named content[J]. Communications of the ACM, 2012,55(1): 117-124.
|
[3] |
兰巨龙, 程东年, 胡宇翔 . 可重构信息通信基础网络体系研究[J]. 通信学报, 2014,35(1): 128-139. LAN J L , CHENG D N , HU Y X . Research on reconfigurable information communication based network architecture[J]. Journal on Communications, 2014,35(1): 128-139.
|
[4] |
ACS G , CONTI M , GASTI P ,et al. Cache privacy in named-data networking[C]// IEEE International Conference on Distributed Computing Systems. Philadelphia,USA, 2013: 41-51.
|
[5] |
CHAABANE A , DE CRISTOFARO E , KAAFAR M A ,et al. Privacy in content-oriented networking:threats and countermeasures[J]. ACM SIGCOMM Computer Communication Review, 2013,43(3): 25-33.
|
[6] |
LAUINGER T . Security & scalability of content-centric networking[D]. TU Darmstadt, 2010.
|
[7] |
CONTI M , GASTI P , TEOLI M . A lightweight mechanism for detection of cache pollution attacks in named data networking[J]. Computer Networks, 2013,57(16): 3178-3191.
|
[8] |
PARK H , WIDJAJA I , LEE H . Detection of cache pollution attacks using randomness checks[C]// IEEE International Conference on Communications (ICC). Ottawa, 2012: 1096-1100.
|
[9] |
XIE M , WIDJAJA I , WANG H . Enhancing cache robustness for content-centric networking[C]// IEEE INFOCOM Annual IEEE International Conference on Computer Communications. Orlando, 2012: 2426-2434.
|
[10] |
SANDBERG A,EKL?V D , HAGERSTEN E . Reducing cache pollution through detection and elimination of non-temporal memory accesses[C]// 2010 ACM/IEEE International Conference for High Performance Computing,Networking,Storage and Analysis. Washington DC:IEEE Computer Society, 2010: 1-11.
|
[11] |
KIM Y , YEOM I . Performance analysis of in-network caching for content-centric networking[J]. Computer Networks, 2013,57(13): 2465-2482.
|
[12] |
DAN A , TOWSLEY D . An approximate analysis of the LRU and FIFO buffer replacement schemes[M]. New York,USA: ACM PublisherPress, 1990: 143-152.
|
[13] |
CHAI W K , HE D , PSARAS I ,et al. Cache “less for more” in information-centric networks[C]// IFIP Networking. Prague,Czech, 2012: 27-40.
|
[14] |
ROSENSWEIG E J , KUROSE J , TOWSLEY D . Approximate models for general cache networks[C]// IEEE INFOCOM 2010. San Diego, 2010: 1-9.
|
[15] |
DENG L , GAO Y , CHEN Y ,et al. Pollution attacks and defenses for Internet caching systems[J]. Computer Networks, 2008,52(5): 935-956.
|
[16] |
MOHAISEN A , ZHANG X W , SCHUCHARD M ,et al. Protecting access privacy of cached contents in information centric networks[C]// ACM SIGSAC Symposium on Information,Computer and Communications Security. Hangzhou,China, 2013: 173-178.
|
[17] |
AFANASYEV A , MAHADEVAN P , MOISEENKO I ,et al. Interest flooding attack and countermeasures in named data networking[C]// IFIP Networking Conference. New York, 2013: 1-9.
|