2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969757
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Scheme Based on Fragments Storage and Fragments Recombination in CCN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…There are three ways to mitigate replay attack in NDN: timestamp and nonces [76], [77], [78], [79], authentication [70], [80], [81], [82], [83], [84], and the use of blockchain [85], [86].…”
Section: Replay Attackmentioning
confidence: 99%
“…There are three ways to mitigate replay attack in NDN: timestamp and nonces [76], [77], [78], [79], authentication [70], [80], [81], [82], [83], [84], and the use of blockchain [85], [86].…”
Section: Replay Attackmentioning
confidence: 99%