Name-signature lookup system: a security enhancement to named data networking
Named Data Networking (NDN) is a content-centric networking, where the publisher of the packet signs and encapsulates the data packet with a name-content-signature encryption to verify the authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to...
| Main Authors: | Song, Zhicheng, Kar, Pushpendu |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/64773/ |
Similar Items
Methodology for Examining Plant-Names in English Place-Names
by: Rayner, Corinna
Published: (2024)
by: Rayner, Corinna
Published: (2024)
The racialisation of names: names and the persistence of racism in the UK
by: Wykes, Emily Jay
Published: (2013)
by: Wykes, Emily Jay
Published: (2013)
The place names of Leicestershire and Rutland
by: Cox, Barrie
Published: (1971)
by: Cox, Barrie
Published: (1971)
A survey and analysis of the place-names of Staffordshire
by: Horovitz, David
Published: (2003)
by: Horovitz, David
Published: (2003)
Russell-names: an introduction to Millian descriptivism
by: Predelli, Stefano
Published: (2016)
by: Predelli, Stefano
Published: (2016)
Place-names of the Whittlewood area
by: Forward, Eleanor J.
Published: (2008)
by: Forward, Eleanor J.
Published: (2008)
Minor and field-names of Thurgarton Wapentake, Nottinghamshire
by: Gregory, Rebecca Katharine
Published: (2017)
by: Gregory, Rebecca Katharine
Published: (2017)
Who’s afraid of the predicate theory of names?
by: Predelli, Stefano
Published: (2015)
by: Predelli, Stefano
Published: (2015)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
Does the Stock Market Value Brands? A Qualitative Investigation into Ladbroke Group's Decision to Change Name
by: Morrison, Gavin
Published: (2006)
by: Morrison, Gavin
Published: (2006)
When is a hill not simply a hill? Investigating nuance in (early) medieval place-names
by: Lloyd, Abigail
Published: (2025)
by: Lloyd, Abigail
Published: (2025)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Indigenous naming practices in the Western Mediterranean: the case of Iberian
by: Moncunill Martí, Noemí
Published: (2017)
by: Moncunill Martí, Noemí
Published: (2017)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Arboreal Toponyms: tree place-names in early medieval England
by: Treacher, Jessica
Published: (2023)
by: Treacher, Jessica
Published: (2023)
Performance evaluation of adaptive forwarding strategy using stochastic adaptive forwarding (SAF) in named data networking
by: Jemangin, Nor Faizah
Published: (2018)
by: Jemangin, Nor Faizah
Published: (2018)
“Call me by my name”: Names, address, and the subjectivization of Korean women
by: Milak, Eldin
Published: (2022)
by: Milak, Eldin
Published: (2022)
Old English sǣte and the historical significance of 'folk'-names
by: Baker, John
Published: (2017)
by: Baker, John
Published: (2017)
A Survey of the place-names of the Isle of Axholme, Lincolnshire
by: Bullen, Kathryn Faye
Published: (2024)
by: Bullen, Kathryn Faye
Published: (2024)
Communication across languages and cultures - A perspective of brand name translation from English to Chinese
by: Sang, J., et al.
Published: (2008)
by: Sang, J., et al.
Published: (2008)
“Your name does not tick the box”: the intertwining of names, bodies, religion and nationality in the construction of identity within the UK asylum system
by: Madziva, Roda
Published: (2017)
by: Madziva, Roda
Published: (2017)
Theatre, Parody and Politics in Wilkie Collins's No Name
by: Jones, Miriam
Published: (2022)
by: Jones, Miriam
Published: (2022)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A Study on Anglo-Scandinavian bý(r)-names: Statistical Analysis and Case-Studies
by: Neal, Joshua
Published: (2023)
by: Neal, Joshua
Published: (2023)
Systematic derivation of an Australian standard for Tall Man lettering to distinguish similar drug names
by: Emmerton, Lynne, et al.
Published: (2015)
by: Emmerton, Lynne, et al.
Published: (2015)
What's in a name?: Digital resources and resistance at the global periphery
by: Kent, Michael
Published: (2012)
by: Kent, Michael
Published: (2012)
Analysis and Decentralised Optimal Flow Control of Heterogeneous Computer Communication Network Models
by: Ku Mahamud, Ku Ruhana
Published: (1993)
by: Ku Mahamud, Ku Ruhana
Published: (1993)
Optimal channel feedback in FDD massive MIMO systems using an angle-of-departure (AoD)
by: Al-Hafidh, Bakr Mohammed Abdulhadi
Published: (2019)
by: Al-Hafidh, Bakr Mohammed Abdulhadi
Published: (2019)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Performance Evaluation of FDDI Network Using Synchronous Traffic
by: Kolan De Velu, Saravanan
Published: (2000)
by: Kolan De Velu, Saravanan
Published: (2000)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Mobile agent-based data gathering approaches for static multiple mobile agent itinerary in wireless sensor networks
by: Qadori, Huthiafa Q
Published: (2018)
by: Qadori, Huthiafa Q
Published: (2018)
A Study of Security Limitations in Virtual Local Area Network Implementation
by: Balasundaram, Arumugam
Published: (2003)
by: Balasundaram, Arumugam
Published: (2003)
House rules: the collaborative nature of policy in domestic networks
by: Crabtree, Andy, et al.
Published: (2015)
by: Crabtree, Andy, et al.
Published: (2015)
Provenance network analytics: an approach to data analytics using data provenance
by: Huynh, Trung Dong, et al.
Published: (2018)
by: Huynh, Trung Dong, et al.
Published: (2018)
Seismic data conditioning and neural network-based attribute selection for enhanced fault detection
by: Chehrazi, A., et al.
Published: (2013)
by: Chehrazi, A., et al.
Published: (2013)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Il trattamento dei nomi propri nella traduzione di documenti giuridici tra l’italiano e l’inglese [The translation of proper names from Italian to English in legal documents]
by: Loiacono, Rocco
Published: (2011)
by: Loiacono, Rocco
Published: (2011)
Similar Items
-
Methodology for Examining Plant-Names in English Place-Names
by: Rayner, Corinna
Published: (2024) -
The racialisation of names: names and the persistence of racism in the UK
by: Wykes, Emily Jay
Published: (2013) -
The place names of Leicestershire and Rutland
by: Cox, Barrie
Published: (1971) -
A survey and analysis of the place-names of Staffordshire
by: Horovitz, David
Published: (2003) -
Russell-names: an introduction to Millian descriptivism
by: Predelli, Stefano
Published: (2016)