[1] Liu X, Li Z, Yang P, et al. Information-centric mobile Ad hoc networks and content routing:a survey[J]. Ad Hoc Networks, 2017, 58:255-268. [2] Yu K, Eum S, Kurita T, et al. Information-centric networking:research and standardization status[J]. IEEE Access, 2019, 7:126164-126176. [3] Zhang Z, Yu Y, Zhang H, et al. An overview of security support in named data networking[J]. IEEE Communications Magazine, 2018, 56(11):62-68. [4] Xue K, He P, Zhang X, et al. A secure, efficient, and accountable edge-based access control framework for information centric networks[J]. IEEE/ACM Transactions on Networking, 2019, 27(3):1220-1233. [5] Kim D, Bi J, Vasilakos A V, et al. Security of cached content in NDN[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(12):2933-2944. [6] Li Q, Zhang X, Zheng Q, et al. LIVE:lightweight integrity verification and content access control for named data networking[J]. IEEE Transactions on Information Forensics and Security, 2014, 10(2):308-320. [7] Li B, Huang D, Wang Z, et al. Attribute-based access control for ICN naming scheme[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 15(2):194-206. [8] Hamdane B, El Fatmi S G. A credential and encryption based access control solution for named data networking[C]//2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). Ottawa:IEEE, 2015:1234-1237. [9] Liu N, Gao S, Hou N. CDAC:a collaborative data access control scheme in named data networking[C]//2019 2nd International Conference on Hot Information-Centric Networking (HotICN). Chongqing:IEEE, 2019:44-49. [10] Misra S, Tourani R, Natividad F, et al. AccConF:an access control framework for leveraging in-network cached data in the ICN-enabled wireless edge[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(1):5-17. [11] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613. [12] Boneh D. The decision diffie-hellman problem[C]//International Algorithmic Number Theory Symposium. Springer:Heidelberg, 1998:48-63. [13] He J, Dawson E. Multisecret-sharing scheme based on one-way function[J]. Electronics Letters, 1995, 31(2):93-95. [14] Mastorakis S, Afanasyev A, Zhang L. On the evolution of ndnSIM:an open-source simulator for NDN experimentation[J]. ACM SIGCOMM Computer Communication Review, 2017, 47(3):19-33. [15] Free Software Foundation. The GNU multiple precision arithmetic library[EB/OL]. 2020(2020-01-17)[2020-09-30]. https://gmplib.org/. |