{"id":"https://openalex.org/W2418402761","doi":"https://doi.org/10.1145/2935663.2935676","title":"Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key","display_name":"Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key","publication_year":2016,"publication_date":"2016-06-10","ids":{"openalex":"https://openalex.org/W2418402761","doi":"https://doi.org/10.1145/2935663.2935676","mag":"2418402761"},"language":"en","primary_location":{"id":"doi:10.1145/2935663.2935676","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2935663.2935676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Future Internet Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035991742","display_name":"Hongwei Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongwei Meng","raw_affiliation_strings":["(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"],"affiliations":[{"raw_affiliation_string":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430408","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0002-1473-2224"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"],"affiliations":[{"raw_affiliation_string":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113779390","display_name":"Jianbin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Hu","raw_affiliation_strings":["(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)"],"affiliations":[{"raw_affiliation_string":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education)","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education) and National Engineering Research Center of Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"(School of Electronics Engineering and Computer Science, Peking University, Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education, Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education) and National Engineering Research Center of Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035991742"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.05279658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2011","issue":null,"first_page":"62","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.8243844509124756},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7622861862182617},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.694265604019165},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.636218249797821},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6178461313247681},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5902416706085205},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5841377377510071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5321582555770874},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.4849138855934143},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4663357734680176},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.43619489669799805},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.419717401266098},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2858896255493164},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10421204566955566},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09005427360534668}],"concepts":[{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.8243844509124756},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7622861862182617},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.694265604019165},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.636218249797821},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6178461313247681},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5902416706085205},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5841377377510071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5321582555770874},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.4849138855934143},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4663357734680176},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.43619489669799805},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.419717401266098},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2858896255493164},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10421204566955566},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09005427360534668},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2935663.2935676","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2935663.2935676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Future Internet Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1658748398","https://openalex.org/W1859864512","https://openalex.org/W1979612096","https://openalex.org/W1981293710","https://openalex.org/W2004053321","https://openalex.org/W2013243305","https://openalex.org/W2055970060","https://openalex.org/W2091294326","https://openalex.org/W2093773865","https://openalex.org/W2136930733","https://openalex.org/W2155527034","https://openalex.org/W2155903900","https://openalex.org/W2156186849","https://openalex.org/W2260273397","https://openalex.org/W2400355313","https://openalex.org/W2462127748","https://openalex.org/W2757526596","https://openalex.org/W4251630043","https://openalex.org/W6645092619","https://openalex.org/W6821701363","https://openalex.org/W6825729112"],"related_works":["https://openalex.org/W2763050151","https://openalex.org/W2001371286","https://openalex.org/W1915479549","https://openalex.org/W1606380665","https://openalex.org/W2994213367","https://openalex.org/W1955053247","https://openalex.org/W2036546368","https://openalex.org/W2047347125","https://openalex.org/W1484754451","https://openalex.org/W2104283649"],"abstract_inverted_index":{"In":[0,26],"order":[1],"to":[2,28,78],"enable":[3],"intrinsic":[4,80],"security":[5],"without":[6,150],"the":[7,20,48,59,65,94,101],"Public":[8,53],"Key":[9,54],"Infrastructure":[10],"(PKI)":[11],"deployment,":[12],"flat":[13,91],"self-certifying":[14,31,45],"addresses":[15],"have":[16],"been":[17],"involved":[18],"into":[19],"future":[21],"Internet":[22,66],"architecture":[23],"(FIA)":[24],"designs.":[25],"contrast":[27],"deriving":[29],"a":[30,36],"address":[32],"from":[33],"hashing":[34],"of":[35,61,112,144],"correspondent":[37,95],"prepared":[38],"public":[39,96],"key,":[40],"we":[41],"build":[42],"up":[43],"this":[44],"relationship":[46],"along":[47],"reverse":[49],"path":[50],"using":[51],"Combined":[52],"(CPK).":[55],"Our":[56],"design":[57,114],"develop":[58],"chain":[60],"trust":[62],"embedded":[63],"in":[64,118,147],"name/address":[67],"registration":[68],"and":[69,76,93,106,123,130],"allocation":[70],"process":[71],"for":[72],"domains,":[73],"hosts,":[74],"services":[75],"content,":[77],"establish":[79],"bindings":[81],"between":[82,103],"three":[83],"different":[84],"identities:":[85],"user-level":[86],"human-readable":[87],"names,":[88],"network-level":[89],"routable":[90],"identifiers":[92],"keys.":[97],"This":[98],"binding":[99],"connects":[100],"accountability":[102],"real-world":[104],"space":[105],"network":[107,126],"space.":[108],"The":[109,132],"use":[110],"cases":[111],"our":[113],"are":[115],"also":[116,134],"given":[117],"named":[119],"data":[120],"networking":[121],"(NDN)":[122],"identity/locator":[124],"splitting":[125],"architecture,":[127],"i.e.":[128],"XIA":[129],"MobilityFirst.":[131],"analysis":[133],"shows":[135],"that":[136],"identity":[137],"authentication":[138],"based":[139],"on":[140],"CPK":[141],"is":[142],"capable":[143],"resource-constrained":[145],"nodes":[146],"large-scale":[148],"networks":[149],"scalability":[151],"tradeoffs.":[152]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
