{"id":"https://openalex.org/W2735750480","doi":"https://doi.org/10.1109/tifs.2017.2725229","title":"Security of Cached Content in NDN","display_name":"Security of Cached Content in NDN","publication_year":2017,"publication_date":"2017-07-10","ids":{"openalex":"https://openalex.org/W2735750480","doi":"https://doi.org/10.1109/tifs.2017.2725229","mag":"2735750480"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2725229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2725229","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100607748","display_name":"Dohyung Kim","orcid":"https://orcid.org/0000-0002-6364-1505"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Dohyung Kim","raw_affiliation_strings":["Sungkyunkwan University, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, South Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076480986","display_name":"Jun Bi","orcid":"https://orcid.org/0000-0002-8695-1047"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Bi","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Athanasios V. Vasilakos","raw_affiliation_strings":["Lulea University of Technology Sweden, Lule\u00e5, Sweden"],"affiliations":[{"raw_affiliation_string":"Lulea University of Technology Sweden, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069640561","display_name":"Ikjun Yeom","orcid":"https://orcid.org/0000-0001-7883-2905"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ikjun Yeom","raw_affiliation_strings":["Sungkyunkwan University, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, South Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100607748"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":5.1799,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.96053967,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"12","first_page":"2933","last_page":"2944"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11342","display_name":"Carbon and Quantum Dots Applications","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9459999799728394,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8671220541000366},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6199728846549988},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.597659707069397},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5765557289123535},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5724597573280334},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5437716841697693},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5428460240364075},{"id":"https://openalex.org/keywords/content-centric-networking","display_name":"Content centric networking","score":0.47422027587890625},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.46285712718963623},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.4311203360557556},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.41613149642944336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3926292657852173},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23331940174102783},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21757802367210388},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.2064037322998047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8671220541000366},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6199728846549988},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.597659707069397},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5765557289123535},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5724597573280334},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5437716841697693},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5428460240364075},{"id":"https://openalex.org/C2779649860","wikidata":"https://www.wikidata.org/wiki/Q18206174","display_name":"Content centric networking","level":3,"score":0.47422027587890625},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.46285712718963623},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.4311203360557556},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.41613149642944336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3926292657852173},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23331940174102783},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21757802367210388},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2064037322998047},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2725229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2725229","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G5091710160","display_name":null,"funder_award_id":"NRF-2016R1C1B1015846","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G6666105419","display_name":null,"funder_award_id":"NRF-2016M3C4A7952587","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1862105587","https://openalex.org/W1918162579","https://openalex.org/W1934974943","https://openalex.org/W1984778122","https://openalex.org/W1998976437","https://openalex.org/W2014952121","https://openalex.org/W2018793106","https://openalex.org/W2042227350","https://openalex.org/W2045665001","https://openalex.org/W2047251584","https://openalex.org/W2057230952","https://openalex.org/W2059948236","https://openalex.org/W2144684817","https://openalex.org/W2150495639","https://openalex.org/W2159587870","https://openalex.org/W2160042131","https://openalex.org/W2327226400","https://openalex.org/W2367132056","https://openalex.org/W2512103536","https://openalex.org/W2963391656","https://openalex.org/W2963445511","https://openalex.org/W3125100762","https://openalex.org/W6646562260","https://openalex.org/W6654759463","https://openalex.org/W6661959468","https://openalex.org/W6686127269","https://openalex.org/W6707876410","https://openalex.org/W6725336061"],"related_works":["https://openalex.org/W2122026593","https://openalex.org/W1561553168","https://openalex.org/W2606300586","https://openalex.org/W3204172802","https://openalex.org/W2366036374","https://openalex.org/W1999624142","https://openalex.org/W4312704496","https://openalex.org/W2165201607","https://openalex.org/W2005315877","https://openalex.org/W1523495671"],"abstract_inverted_index":{"In":[0,74,141],"Named-Data":[1],"Networking":[2],"(NDN),":[3],"content":[4,24,33,45,50,61,82,93,96,134],"is":[5,39,51,62,135],"cached":[6],"in":[7,41,46,94,127],"network":[8,27],"nodes":[9],"and":[10,28,89,158,175],"served":[11],"for":[12,182],"future":[13],"requests.":[14],"This":[15],"property":[16],"of":[17,44,114,132,151,171],"NDN":[18,47],"allows":[19,176],"attackers":[20],"to":[21,72,110,124,137,179],"inject":[22],"poisoned":[23,49,115],"into":[25],"the":[26,95,100,148,169],"isolate":[29],"users":[30],"from":[31],"valid":[32],"sources.":[34],"Since":[35],"a":[36,81,129,160],"digital":[37],"signature":[38,56],"embedded":[40],"every":[42,60,65,112],"piece":[43,113],"architecture,":[48],"discarded":[52],"if":[53,59],"routers":[54,121],"perform":[55],"verification;":[57],"however,":[58,120],"verified":[63,92],"by":[64,103],"router,":[66],"it":[67],"would":[68],"be":[69,180],"overly":[70],"expensive":[71],"do.":[73],"our":[75,152,172],"preliminary":[76,153,173],"work,":[77,154],"we":[78,144],"have":[79],"suggested":[80],"verification":[83,88,101,125,156],"scheme":[84],"that":[85],"minimizes":[86],"unnecessary":[87],"favors":[90],"already":[91],"store,":[97],"which":[98,128],"reduces":[99],"overhead":[102],"as":[104,106],"much":[105],"90%":[107],"without":[108],"failing":[109],"detect":[111],"content.":[116],"Under":[117],"this":[118,142,177],"scheme,":[119],"are":[122],"vulnerable":[123],"attack,":[126,157],"large":[130],"amount":[131],"unverified":[133],"accessed":[136],"exhaust":[138],"system":[139],"resources.":[140],"paper,":[143],"carefully":[145],"look":[146],"at":[147],"possible":[149],"concerns":[150],"including":[155],"present":[159],"simple":[161],"but":[162],"effective":[163],"solution.":[164],"The":[165],"proposed":[166],"solution":[167],"mitigates":[168],"weakness":[170],"work":[174],"paper":[178],"deployed":[181],"real-world":[183],"applications.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
