2018 IEEE 43rd Conference on Local Computer Networks (LCN) 2018
DOI: 10.1109/lcn.2018.8638129
|View full text |Cite
|
Sign up to set email alerts
|

In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…We pay attention to the schemes [ 30 , 31 , 32 , 33 ] having the similar features as our proposed scheme, i.e., use of hybrid encryption, no need of trusted third party, and effective use of in-network caching mechanism. We compare our scheme with the schemes with respect to the various factors associated with the encryption-based access control in NDN, as described in Table 4 .…”
Section: Comparisonsmentioning
confidence: 99%
See 4 more Smart Citations
“…We pay attention to the schemes [ 30 , 31 , 32 , 33 ] having the similar features as our proposed scheme, i.e., use of hybrid encryption, no need of trusted third party, and effective use of in-network caching mechanism. We compare our scheme with the schemes with respect to the various factors associated with the encryption-based access control in NDN, as described in Table 4 .…”
Section: Comparisonsmentioning
confidence: 99%
“…Although, the scheme [ 31 ], provides the cache awareness in the same level as our work, it incurs higher storage and computational burden in the network since it needs to store the key management tables at the edge router. When an interest request arrives, it needs to check against both tables for further message flows and key management operations.…”
Section: Comparisonsmentioning
confidence: 99%
See 3 more Smart Citations