[1] |
KOPONEN T , CHAWLA M , GON C B ,et al. A data-oriented (and beyond) network architecture[A]. Proceedings of the ACM SIGCOMM 2007 Conference[C]. Kyoto,Japan, 2007. 181-192.
|
[2] |
European Union. Project FP7 4WARD[EB/OL]. , 2010.
|
[3] |
European Union. Project PSIRP[EB/OL]. , 2010.
|
[4] |
JACOBSON V , SMETTERS D K , THORNTON J D ,et al. Networking named content[A]. Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies[C]. Rome,Italy, 2009. 1-12.
|
[5] |
VASILAKOS A V , LI Z , SIMON G ,et al. Information centric network:research challenges and opportunities[J]. Journal of Network and Computer Applications, 2015,(52): 1-10.
|
[6] |
FOTIOU N , POLYZOS G C . ICN privacy and name based security[A]. Proceedings of the 1st International Conference on Information-Centric Networking[C]. ACM, 2014. 5-6.
|
[7] |
LAUINGER T . Security & Scalability of Content-Centric Networking[D]. TU Darmstadt, 2010.
|
[8] |
ACS G , CONTI M , GASTI P ,et al. Cache privacy in named-data networking[A]. Distributed Computing Systems (ICDCS),2013 IEEE 33rd International Conference[C]. IEEE, 2013. 41-51.
|
[9] |
CHAABANE A , DE CRISTOFARO E , KAAFAR M A ,et al. Privacy in content-oriented networking:threats and countermeasures[J]. ACM SIGCOMM Computer Communication Review, 2013,43(3): 25-33.
|
[10] |
MOHAISEN A , ZHANG X , SCHUCHARD M ,et al. Protecting access privacy of cached contents in information centric networks[A]. Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications security[C]. ACM, 2013. 173-178.
|
[11] |
MOHAISEN A , MEKKY H , ZHANG X ,et al. Timing attacks on access privacy in information centric networks and countermeasures[J]. IEEE Transactions on Dependable and Secure Computing, 2015 (online first).
|
[12] |
LAUINGER T , LAOUTARIS N , RODRIGUEZ P ,et al. Privacy risks in named data networking:what is the cost of performance[J]. ACM SIGCOMM Computer Communication Review, 2012,42(5): 54-57.
|
[13] |
ARIANFAR S , KOPONEN T , RAGHAVAN B ,et al. On preserving privacy in content-oriented networks[A]. Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking[C]. ACM, 2011. 19-24.
|
[14] |
LAUINGER T , LAOUTARIS N , RODRIGUEZ P ,et al. Privacy implications of ubiquitous caching in named data networking architectures[R]. Technical Report TR-iSecLab-0812-001,iSecLab, 2012.
|
[15] |
葛国栋, 郭云飞, 刘彩霞 ,等. 内容中心网络中面向隐私保护的协作缓存策略[J]. 电子与信息学报, 2015,37(5): 1220-1226. GE G D , GUO Y F , LIU C X ,et al. A collaborative caching strategy for privacy protection in content centric networking[J]. Journal of Electronics & In for motion Technology, 2015,37(5): 1220-1226.
|
[16] |
LAOUTARIS N , CHE H , STAVRAKAKIS I . The LCD interconnection of LRU caches and its analysis[J]. Performance Evaluation, 2006,63(7): 609-634.
|
[17] |
CAROFIGLIO G , GALLO M , MUSCARIELLO L ,et al. Lookout, “what is a mobile threat”[EB/OL]. , 2011.
|
[18] |
CAROFIGLIO G , GALLO M , MUSCARIELLO L . On the performance of bandwidth and storage sharing in information-centric networks[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking, 2013,57(17): 3743-3758.
|
[19] |
WANG G , HUANG T , JIANG L I U ,et al. Modeling in-network caching and bandwidth sharing performance in information-centric networking[J]. The Journal of China Universities of Posts and Telecommunications, 2013,20(2): 99-105.
|
[20] |
WANG K , CHEN J , ZHOU H ,et al. Modeling denial-of-service against pending interest table in named data networking[J]. International Journal of Communication Systems, 2014,27(12): 4355-4368.
|
[21] |
MANGILI M , MARTIGNON F , PARABOSCHI S . A cache-aware mechanism to enforce confidentiality,trackability and access policy evolution in content-centric networks[J]. Computer Networks, 2015,(76): 126-145.
|
[22] |
FRICKER C , ROBERT P , ROBERTS J ,et al. Impact of traffic mix on caching performance in a content-centric network[A]. Computer Communications Workshops (INFOCOM WKSHPS),2012 IEEE Conference[C]. IEEE, 2012. 310-315.
|