2023
DOI: 10.1063/5.0128154
|View full text |Cite
|
Sign up to set email alerts
|

Data authentication mechanism using blockchain’s proof-of-trust mechanism in named data networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Another important feature of NDN is its built-in security mechanism. In NDN, content producers employ digital signatures to sign their content objects, ensuring that only legitimate requesters (Consumers) can access the specific data content (14). This security measure guarantees that content retrieval is only possible using shared public keys, while the private key remains with the content provider (15).…”
Section: Introductionmentioning
confidence: 99%
“…Another important feature of NDN is its built-in security mechanism. In NDN, content producers employ digital signatures to sign their content objects, ensuring that only legitimate requesters (Consumers) can access the specific data content (14). This security measure guarantees that content retrieval is only possible using shared public keys, while the private key remains with the content provider (15).…”
Section: Introductionmentioning
confidence: 99%