Abstract | ||
---|---|---|
Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focus... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1049/iet-ifs.2017.0390 | IET Information Security |
Keywords | Field | DocType |
data privacy,Internet | Forwarding information base,Computer science,Computer security,Computer network,Content centric networking,Ciphertext,Plaintext | Journal |
Volume | Issue | ISSN |
12 | 2 | 1751-8709 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiaonan Wang | 1 | 238 | 34.66 |
Zhengxiong Dou | 2 | 4 | 3.77 |
Yi Mu | 3 | 2884 | 239.05 |