2020 29th International Conference on Computer Communications and Networks (ICCCN) 2020
DOI: 10.1109/icccn49398.2020.9209599
|View full text |Cite
|
Sign up to set email alerts
|

Managing the Evolution to Future Internet Architectures and Seamless Interoperation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…3, with gateways for interoperation among IP, NDN, and MF (Fig. 1 as an example) in a software testbed (implementation details in [11]). This section provides the description and results of our analysis of the ICI framework (our Alloy source code is approximately 800 lines of code in total [1]).…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…3, with gateways for interoperation among IP, NDN, and MF (Fig. 1 as an example) in a software testbed (implementation details in [11]). This section provides the description and results of our analysis of the ICI framework (our Alloy source code is approximately 800 lines of code in total [1]).…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…The HTTP over hICN is prone to reflection attacks, and the authors propose a client signature-based mitigation approach to tackle the threat. In the paper [21], the authors discuss a contentoriented interoperable COIN network for current and future internet architectures. They mainly focus on static and content retrieval in IP, NDN and MobilityFirst architectures through Object Resolution Services.…”
Section: A Web Applicationmentioning
confidence: 99%
“…This approach improves the NDN routing capability with route aggregation. The strategy in [38] puts a default prefix at the beginning of the CCN name, HTTP protocol, request method, and request domain, and the request parameters are hierarchically appended.In a flat naming convention like MobilityFirst, the key to translation is generating a globally unique ID that identifies the content/host [35,39]. In [35], the authors use a public key generated by the Elliptic Curve Cryptography (ECC) algorithm as the content ID.…”
mentioning
confidence: 99%