2020 16th International Conference on Mobility, Sensing and Networking (MSN) 2020
DOI: 10.1109/msn50589.2020.00099
|View full text |Cite
|
Sign up to set email alerts
|

Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Work in [39], a monitoring system for detecting anomalies using Bayesian Network. The last invasion comes from Ko et al [40], which proposes Public Key Encryption Keyword Search (PEKS) for forwarding packets. It has overcome the issue of cryptographic operation.…”
Section: F Securitymentioning
confidence: 99%
“…Work in [39], a monitoring system for detecting anomalies using Bayesian Network. The last invasion comes from Ko et al [40], which proposes Public Key Encryption Keyword Search (PEKS) for forwarding packets. It has overcome the issue of cryptographic operation.…”
Section: F Securitymentioning
confidence: 99%