[1] Jacobson V, Smetters D K, Thornton J D, et al. Networking named content[C]//ACM Conference on Emerging Networking Experiments and Technology, CONEXT 2009. Rome:ACM, 2012:117-124.
[2] Lauinger T. Security & scalability of content-centric networking[D]. Darmstadt:TU Darmstadt, 2010.
[3] Ribeiro I, Rocha A, Albuquerque C, et al. On the possibility of mitigating content pollution in content-centric networking[C]//2014 IEEE 39th Conference on Local Computer Networks. Edmonton:IEEE, 2014:498-501.
[4] Gasti P, Tsudik G, Uzun E, et al. DoS and DDoS in named data networking[C]//201322nd International Conference on Computer Communication and Networks (ICCCN). Nassau:IEEE, 2013:1-7.
[5] Bianchi G, Detti A, Caponi A, et al. Check before storing:what is the performance price of content integrity verification in LRU caching[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3):59-67.
[6] Nam S W, Kim D, Yeom I. Content verification in named data networking[C]//2015International Conference on Information Networking. Cambodia:IEEE, 2015:414-415.
[7] Kim D, Nam S, Bi J, et al. Efficient content verification in named data networking[C]//Proceedings of the 2nd ACM Conference on Information-Centric Networking. New York:ACM, 2015:109-116.
[8] DiBenedetto S, Papadopoulos C. Mitigating poisoned content with forwarding strategy[C]//Computer Communications Workshops (INFOCOM WKSHPS). San Francisco:IEEE, 2016:164-169.
[9] Li Yun, Zhao Ling, Liu Zhanjun, et al. N-Drop:congestion control strategy under epidemic routing in DTN[C]//International Conference on Wireless Communications and Mobile Computing:Connecting the World Wirelessly. Leipzig:ACM, 2009:457-460.
[10] Wang Guoqing, Huang Tao, Liu Jiang, et al. Modeling in-network caching and bandwidth sharing performance in information-centric networking[J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20(2):99-105.
[11] 崔现东, 刘江, 黄韬, 等. 基于节点介数和替换率的内容中心网络网内缓存策略[J]. 电子与信息学报, 2014, 36(1):1-7.
[12] Zhu Yi, Mi Zhengkun, Wang Wennai. A probability caching decision policy with evicted copy up in content centric networking[J]. Journal of Internet Technology, 2017, 18(1):33-43. |