{"id":"https://openalex.org/W3192140069","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498877","title":"Secure Multimedia Content Retrievals via Multi-path Transmission in Named Data Networking","display_name":"Secure Multimedia Content Retrievals via Multi-path Transmission in Named Data Networking","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3192140069","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498877","mag":"3192140069"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc51323.2021.9498877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115883269","display_name":"Jie Song","orcid":"https://orcid.org/0000-0002-0846-7591"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Song","raw_affiliation_strings":["School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004919779","display_name":"Yanming Xue","orcid":"https://orcid.org/0000-0002-3812-5955"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanming Xue","raw_affiliation_strings":["School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359033","display_name":"Tong Li","orcid":"https://orcid.org/0000-0002-6805-9565"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Li","raw_affiliation_strings":["School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068974015","display_name":"Hao Xing","orcid":"https://orcid.org/0000-0002-6995-2486"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Xing","raw_affiliation_strings":["School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronics, Beijing Institute of Technology, Beijing, P.R. China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115883269"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59312626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9099860787391663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8847930431365967},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7973052859306335},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5919662714004517},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5148972272872925},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4853042960166931},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.46114593744277954},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43153366446495056},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.42863672971725464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3874463140964508}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9099860787391663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8847930431365967},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7973052859306335},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5919662714004517},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5148972272872925},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4853042960166931},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.46114593744277954},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43153366446495056},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.42863672971725464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3874463140964508},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc51323.2021.9498877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1531139788","https://openalex.org/W1531914496","https://openalex.org/W1562069137","https://openalex.org/W1577821161","https://openalex.org/W2015823648","https://openalex.org/W2034272219","https://openalex.org/W2048995395","https://openalex.org/W2093773865","https://openalex.org/W2110769762","https://openalex.org/W2128926682","https://openalex.org/W2742227136","https://openalex.org/W2900920873","https://openalex.org/W2908970936","https://openalex.org/W2946338498","https://openalex.org/W2962973644","https://openalex.org/W2964177969","https://openalex.org/W6631441690","https://openalex.org/W6633651994"],"related_works":["https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W112420819","https://openalex.org/W2918039754","https://openalex.org/W2889153935","https://openalex.org/W2982666975"],"abstract_inverted_index":{"Named":[0],"Data":[1],"Networking":[2],"(NDN),":[3],"as":[4],"a":[5,69,78,96,106,120],"typical":[6],"implementation":[7],"for":[8],"Information-Centric":[9],"Network":[10],"(ICN),":[11],"has":[12,29],"been":[13,31],"introduced":[14],"to":[15,33,55,127],"solve":[16],"some":[17],"inherent":[18],"problems":[19],"that":[20,135,159],"arise":[21],"with":[22,74],"today's":[23],"TCP/IP":[24],"network":[25],"model":[26],"and":[27,59],"it":[28],"also":[30],"proven":[32],"have":[34],"good":[35],"prospects":[36],"in":[37,41,104],"multimedia":[38,49],"services.":[39],"Meanwhile,":[40],"the":[42,45,56,83,89,101,129,133,149],"sensitive":[43],"occasions,":[44],"security":[46],"requirements":[47],"of":[48,61,99,123,141],"data":[50,84,152],"transmission":[51],"are":[52],"higher.":[53],"Due":[54],"hacking":[57],"techniques":[58],"misuse":[60],"cryptography,":[62],"signed-packets":[63],"can":[64,81,146],"no":[65,136],"longer":[66],"be":[67],"considered":[68],"safeguard":[70],"from":[71],"attacks.":[72],"Adversaries":[73],"eavesdropping":[75,102],"capability":[76],"along":[77],"routing":[79,108],"path":[80],"compromise":[82],"privacy":[85,142,151],"or":[86],"even":[87],"disconnect":[88],"end-to-end":[90],"communications.":[91],"So,":[92],"we":[93,118],"will":[94],"propose":[95],"new":[97,121],"way":[98],"solving":[100],"problem":[103],"NDN,":[105],"novel":[107],"protocol":[109],"namely":[110],"multi-path":[111,124],"content":[112],"retrieval":[113],"protocol(MPCRP).":[114],"In":[115],"our":[116,144,160],"approach,":[117],"establish":[119,128],"kind":[122],"forwarding":[125],"table(MPFT),":[126],"node-disjoint":[130],"multi-path.":[131],"Under":[132],"condition":[134],"adversary":[137],"obtains":[138],"all":[139],"pieces":[140],"data,":[143],"approach":[145],"securely":[147],"deliver":[148],"user":[150],"against":[153],"eavesdropping.":[154],"The":[155],"ndnSIM":[156],"results":[157],"demonstrate":[158],"MPCRP":[161],"achieves":[162],"its":[163],"design":[164],"goals.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
