4.6 Article

Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Mitigating NDN-Based Fake Content Dissemination in Opportunistic Mobile Networks

Barun Kumar Saha et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Article Computer Science, Theory & Methods

Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model

Elisa Mannes et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Theory & Methods

On spatio-temporal blockchain query processing

Qiang Qu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Renovating blockchain with distributed databases: An open source system

Muhammad Muzammal et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Proceedings Paper Computer Science, Theory & Methods

Privacy Attack Modeling and Risk Assessment Method for Name Data Networking

Vishwa Pratap Singh et al.

ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, IC4S 2018 (2019)

Article Computer Science, Information Systems

Secure Identifier Management Based on Blockchain Technology in NDN Environment

Ho-Kyung Yang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme

Hui Yin et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

A Security Monitoring Plane for Named Data Networking Deployment

Tan Nguyen et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context

Qixu Wang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

Shuo Wang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

Ao Lei et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Theory & Methods

Implementation and Performance Evaluation of Name-based Forwarding Schemes in V-NDN

Divya Saxena et al.

18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2017) (2017)

Article Computer Science, Information Systems

FairAccess: a new Blockchain-based access control framework for the Internet of Things

Aafaf Ouaddah et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Proceedings Paper Engineering, Electrical & Electronic

Adaptive Sequential Offloading Game for Multi-Cell Mobile Edge Computing

Maofei Deng et al.

2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) (2016)

Article Computer Science, Information Systems

Network-Layer Trust in Named-Data Networking

Cesar Ghali et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)

Article Computer Science, Hardware & Architecture

Securing building management systems using named data networking

IEEE NETWORK (2014)

Article Computer Science, Information Systems

Adaptive Forwarding in Named Data Networking

Cheng Yi et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)