Home
  • About
  • GitHub

An NDN Bibliography

The bibliography on this page comprises a collection of references that discuss Named Data Networking (NDN). The basic criterion for inclusion in this list is that the material must explicitly mention NDN more than a passing reference.

References

Abane, A., Daoui, M., Bouzefrane, S., and Muhlethaler, P. 2017. NDN-over-ZigBee: A ZigBee support for named data networking. Future generations computer systems: FGCS. https://doi.org/10.1016/j.future.2017.09.053.

Abdullahi, I., Arif, S., and Hassan, S. 2015. Survey on caching approaches in information centric networking. Journal of Network and Computer Applications 56, 48–59. https://doi.org/10.1016/j.jnca.2015.06.011.

Abraham, H.B. and Crowley, P. 2016. Forwarding strategies for applications in named data networking. 2016 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 111–112. https://doi.org/10.1145/2881025.2889475.

Acs, G., Conti, M., Gasti, P., Ghali, C., and Tsudik, G. 2013. Cache privacy in Named-Data networking. 2013 IEEE 33rd international conference on distributed computing systems, ieeexplore.ieee.org, 41–51. https://doi.org/10.1109/ICDCS.2013.12.

Adrichem, N.L.M. van and Kuipers, F.A. 2013. Globally accessible names in named data networking. 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 345–350. https://doi.org/10.1109/INFCOMW.2013.6970714.

Adrichem, N.L.M. van and Kuipers, F.A. 2015. NDNFlow: Software-defined named data networking. Proceedings of the 2015 1st IEEE conference on network softwarization (NetSoft), ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/NETSOFT.2015.7116131.

Afanasyev, A. 2013. Addressing operational challenges in named data networking through NDNS distributed database. University of California, Los Angeles.

Afanasyev, A., Burke, J., Crowley, P., DiBenedetto, S., Thompson, J., Zhang, B., and Zhang, L. 2014a. An introduction to NDN and its software architecture. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 1–2. https://doi.org/10.1145/2660129.2666709.

Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., Crowley, P., Papadopoulos, C., and Zhang, B. 2014b. Named data networking. ACM SIGCOMM Computer Communication Review 44, 3, 66–73.

Afanasyev, A., Halderman, J.A., Ruoti, S., Seamons, K., Yu, Y., Zappala, D., and Zhang, L. 2016. Content-based security for the web. Proceedings of the 2016 new security paradigms workshop, ACM, 49–60. https://doi.org/10.1145/3011883.3011890.

Afanasyev, A., Jiang, X., Yu, Y., Tan, J., Xia, Y., Mankin, A., and Zhang, L. 2017a. NDNS: A DNS-Like name service for NDN. 2017 26th international conference on computer communication and networks (ICCCN), ieeexplore.ieee.org, 1–9. https://doi.org/10.1109/ICCCN.2017.8038461.

Afanasyev, A., Jiang, X., Yu, Y., Tan, J., Xia, Y., Mankin, A., and Zhang, L. 2017b. NDNS: A DNS-Like name service for NDN. 2017 26th international conference on computer communication and networks (ICCCN), 1–9. https://doi.org/10.1109/ICCCN.2017.8038461.

Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., and Zhang, L. 2013a. Interest flooding attack and countermeasures in named data networking. 2013 IFIP networking conference, ieeexplore.ieee.org, 1–9.

Afanasyev, A., Moiseenko, I., and Zhang, L. 2012a. ndnSIM. NDN simulator for NS-3.

Afanasyev, A., Moiseenko, I., Zhang, L., and Others. 2012b. ndnSIM: NDN simulator for NS-3. University of California, Los Angeles, Tech. Rep 4.

Afanasyev, A., Yi, C., and Wang, L. 2013b. Scaling NDN routing: Old tale, new design..

Afanasyev, A., Yi, C., Wang, L., Zhang, B., and Zhang, L. 2015a. Map-and-encap for scaling ndn routing. Technical Report NDN-0005, NDN; named-data.net.

Afanasyev, A., Yi, C., Wang, L., Zhang, B., and Zhang, L. 2015b. SNAMP: Secure namespace mapping to scale NDN forwarding. 2015 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 281–286. https://doi.org/10.1109/INFCOMW.2015.7179398.

Afanasyev, A., Zhu, Z., Yu, Y., Wang, L., and Zhang, L. 2015c. The story of ChronoShare, or how NDN brought distributed secure file sharing back. 2015 IEEE 12th international conference on mobile ad hoc and sensor systems, 525–530. https://doi.org/10.1109/MASS.2015.59.

Aggarwal, M., Nilay, K., and Yadav, K. 2017. Survey of named data networks: Future of internet. International Journal of Information Technology, 1–11.

Ahmad, Z., Tahir, M., and Others. 2013. Named data networking (NDN), new approach to future internet architecture design: A survey. International Journal of Informatics and Communication Technology (IJ-ICT) 2, 3, 155–165.

Ahmed, S.H., Bouk, S.H., Yaqub, M.A., Kim, D., and Gerla, M. 2016a. CONET: Controlled data packets propagation in vehicular named data networks. 2016 13th IEEE annual consumer communications networking conference (CCNC), ieeexplore.ieee.org, 620–625. https://doi.org/10.1109/CCNC.2016.7444850.

Ahmed, S.H., Bouk, S.H., Yaqub, M.A., Kim, D., Song, H., and Lloret, J. 2016b. CODIE: Controlled data and interest evaluation in vehicular named data networks. IEEE Transactions on Vehicular Technology 65, 6, 3954–3963. https://doi.org/10.1109/TVT.2016.2558650.

Ahmed, S.H. and Kim, D. 2016. Named data networking-based smart home. ICT Express 2, 3, 130–134. https://doi.org/10.1016/j.icte.2016.08.007.

Al Imem, A. 2015. Comparison and evaluation of digital signature schemes employed in ndn network..

Al-Sheikh, S., Wählisch, M., and Schmidt, T.C. 2015. Revisiting countermeasures against NDN interest flooding. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 195–196. https://doi.org/10.1145/2810156.2812604.

Alajlan, M. and Belghith, A. 2017. Supporting seamless mobility for Real-Time applications in named data networking. Procedia computer science 110, 62–69. https://doi.org/10.1016/j.procs.2017.06.117.

Almishari, M., Gasti, P., Nathan, N., and Tsudik, G. 2013. Optimizing bi-directional low-latency communication in named data networking. SIGCOMM Comput. Commun. Rev. 44, 1, 13–19. https://doi.org/10.1145/2567561.2567564.

Alsaffar, A.A. and Huh, E.-N. 2013. A framework of n-screen services based on PVR and named data networking in cloud computing. Proceedings of the 7th international conference on ubiquitous information management and communication, ACM, 100:1–100:7. https://doi.org/10.1145/2448556.2448656.

Alston, A. and Refaei, T. 2016. Neutralizing interest flooding attacks in named data networks using cryptographic route tokens. 2016 IEEE 15th international symposium on network computing and applications (NCA), 85–88. https://doi.org/10.1109/NCA.2016.7778598.

Alubady, R., Hassan, S., and Habbal, A. 2017. Pending interest table control management in named data network. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2017.11.002.

Amadeo, M., Campolo, C., Iera, A., and Molinaro, A. 2014a. Named data networking for IoT: An architectural perspective. 2014 european conference on networks and communications (EuCNC), ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/EuCNC.2014.6882665.

Amadeo, M., Campolo, C., and Molinaro, A. 2014b. Multi-source data retrieval in IoT via named data networking. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 67–76. https://doi.org/10.1145/2660129.2660148.

Amadeo, M., Campolo, C., and Molinaro, A. 2014c. Internet of things via named data networking: The support of push traffic. 2014 international conference and workshop on the network of the future (NOF), ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/NOF.2014.7119766.

Amadeo, M., Campolo, C., and Molinaro, A. 2015. Forwarding strategies in named data wireless ad hoc networks: Design and evaluation. Journal of Network and Computer Applications 50, 148–158. https://doi.org/10.1016/j.jnca.2014.06.007.

Amadeo, M., Campolo, C., Molinaro, A., and Mitton, N. 2013. Named data networking: A natural design for data collection in wireless sensor networks. 2013 IFIP wireless days (WD), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/WD.2013.6686486.

Amadeo, M., Molinaro, A., Campolo, C., Sifalakis, M., and Tschudin, C. 2014d. Transport layer design for named data wireless networking. 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 464–469. https://doi.org/10.1109/INFCOMW.2014.6849276.

Ambrosin, M., Compagno, A., Conti, M., Ghali, C., and Tsudik, G. 2016. Security and privacy analysis of NSF future internet architectures..

Ambrosin, M., Conti, M., Gasti, P., and Tsudik, G. 2014. Covert ephemeral communication in named data networking. Proceedings of the 9th ACM symposium on information, computer and communications security, ACM, 15–26. https://doi.org/10.1145/2590296.2590306.

Anastasiades, C., Thomos, N., Striffeler, A., and Braun, T. 2015. RC-NDN: Raptor codes enabled named data networking. 2015 IEEE international conference on communications (ICC), ieeexplore.ieee.org, 3026–3032. https://doi.org/10.1109/ICC.2015.7248788.

Angius, F., Gerla, M., and Pau, G. 2012. BLOOGO: BLOOm filter based GOssip algorithm for wireless NDN. Proceedings of the 1st ACM workshop on emerging Name-Oriented mobile networking design - architecture, algorithms, and applications, ACM, 25–30. https://doi.org/10.1145/2248361.2248369.

Antunes, R.S., Lehmann, M.B., Mansilha, R.B., Gaspary, L.P., and Barcellos, M.P. 2017. NDNrel: A mechanism based on relations among objects to improve the performance of NDN. Journal of Network and Computer Applications 87, 73–86. https://doi.org/10.1016/j.jnca.2017.03.014.

Arifuzzaman, M., Keping, Y., Nguyen, Q.N., and Takuro, S. 2015. Locating the content in the locality: ICN caching and routing strategy revisited. 2015 european conference on networks and communications (EuCNC), 423–428. https://doi.org/10.1109/EuCNC.2015.7194111.

Asif Iqbal, S.M. 2018. Adaptive forwarding strategies to reduce redundant interests and data in named data networks. Journal of Network and Computer Applications 106, 33–47. https://doi.org/10.1016/j.jnca.2018.01.013.

Attam, A. and Moiseenko, I. 2013. Ndnblue: Ndn over bluetooth. NDN Technical Report NDN-0015.

Azgin, A., Ravindran, R., and Wang, G. 2014a. A scalable Mobility-Centric architecture for named data networking..

Azgin, A., Ravindran, R., and Wang, G. 2014b. Mobility study for named data networking in wireless access networks. 2014 IEEE international conference on communications (ICC), ieeexplore.ieee.org, 3252–3257. https://doi.org/10.1109/ICC.2014.6883822.

Baccelli, E., Mehlis, C., Hahm, O., Schmidt, T.C., and Wählisch, M. 2014. Information centric networking in the IoT: Experiments with NDN in the wild. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 77–86. https://doi.org/10.1145/2660129.2660144.

Balogh, A., Imre, S., Lendvai, K., and Szabó, S. 2015. Service mediation in multihop bluetooth low energy networks based on NDN approach. 2015 23rd international conference on software, telecommunications and computer networks (SoftCOM), ieeexplore.ieee.org, 285–289. https://doi.org/10.1109/SOFTCOM.2015.7314123.

Bandara, H.M.N.D. and Jayasumana, A.P. 2013. Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks. Computer Networks 57, 16, 3235–3248. https://doi.org/10.1016/j.comnet.2013.07.033.

Baugher, M., Davie, B., Narayanan, A., and Oran, D. 2012. Self-verifying names for read-only named data. 2012 proceedings IEEE INFOCOM workshops, ieeexplore.ieee.org, 274–279. https://doi.org/10.1109/INFCOMW.2012.6193505.

Bazzi, A., Masini, B.M., Zanella, A., Castro, C.D., Raffaelli, C., and Andrisano, O. 2014. Cellular aided vehicular named data networking. 2014 international conference on connected vehicles and expo (ICCVE), ieeexplore.ieee.org, 747–752. https://doi.org/10.1109/ICCVE.2014.7297650.

Ben Abraham, H., Afanasyev, A., Yu, Y., Zhang, L., DiBenedetto, S., Thompson, J., and Burke, J. 2015. Tutorial: Security and synchronization in named data networking (NDN). Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 3–6. https://doi.org/10.1145/2810156.2815105.

Bian, C., Zhao, T., Li, X., and Yan, W. 2015. Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications 2, 4, 195–207. https://doi.org/10.1016/j.vehcom.2015.08.001.

Bian, C., Zhu, Z., Afanasyev, A., Uzun, E., and Zhang, L. 2013. Deploying key management on NDN testbed. named-data.net.

Bouk, S.H., Ahmed, S.H., and Kim, D. 2017a. NDN goes deep: Foreseeing the underwater named data networks. Proceedings of the symposium on applied computing, ACM, 642–646. https://doi.org/10.1145/3019612.3019773.

Bouk, S.H., Ahmed, S.H., Kim, D., and Song, H. 2017b. Named-Data-Networking-Based ITS for smart cities. IEEE Communications Magazine 55, 1, 105–111. https://doi.org/10.1109/MCOM.2017.1600230CM.

Bouk, S.H., Ahmed, S.H., Yaqub, M.A., Kim, D., and Gerla, M. 2016. DPEL: Dynamic PIT entry lifetime in vehicular named data networks. IEEE Communications Letters 20, 2, 336–339. https://doi.org/10.1109/LCOMM.2015.2508798.

Burke, J. 2013. Video streaming over named data networking. E-LETTER.

Burke, J., Gasti, P., Nathan, N., and Tsudik, G. 2013. Securing instrumented environments over content-centric networking: The case of lighting control and NDN. 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 394–398. https://doi.org/10.1109/INFCOMW.2013.6970725.

Burke, J., Gasti, P., Nathan, N., and Tsudik, G. 2014. Secure sensing over named data networking. 2014 IEEE 13th international symposium on network computing and applications, ieeexplore.ieee.org, 175–180. https://doi.org/10.1109/NCA.2014.34.

Cabral, C.M.S., Rothenberg, C.E., and Magalhães, M.F. 2013a. Reproducing real NDN experiments using mini-CCNx. Proceedings of the 3rd ACM SIGCOMM workshop on information-centric networking, ACM, 45–46. https://doi.org/10.1145/2491224.2491242.

Cabral, C.M.S., Rothenberg, C.E., and Magalhães, M.F. 2013b. Mini-CCNx: Fast prototyping for named data networking. Proceedings of the 3rd ACM SIGCOMM workshop on information-centric networking, ACM, 33–34. https://doi.org/10.1145/2491224.2491236.

CAIDA. 2017. Tunnel ethernet traffic over NDN - named data networking (NDN). https://named-data.net/2017/09/05/tunnel-ethernet-traffic-ndn/.

Cao, J., Pei, D., Wu, Z., Zhang, X., Zhang, B., Wang, L., and Zhao, Y. 2016a. Improving the freshness of NDN forwarding states. 2016 IFIP networking conference (IFIP networking) and workshops, ieeexplore.ieee.org, 189–197. https://doi.org/10.1109/IFIPNetworking.2016.7497213.

Cao, J., Pei, D., Zhang, X., Zhang, B., and Zhao, Y. 2016b. Fetching popular data from the nearest replica in NDN. 2016 25th international conference on computer communication and networks (ICCCN), ieeexplore.ieee.org, 1–9. https://doi.org/10.1109/ICCCN.2016.7568523.

Carofiglio, G., Gallo, M., and Muscariello, L. 2016. Optimal multipath congestion control and request forwarding in information-centric networks: Protocol design and experimentation. Computer Networks 110, 104–117. https://doi.org/10.1016/j.comnet.2016.09.012.

Carofiglio, G., Gallo, M., Muscariello, L., and Perino, D. 2015. Pending interest table sizing in named data networking. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 49–58. https://doi.org/10.1145/2810156.2810167.

Carzaniga, A., Khazaei, K., Papalini, M., and Wolf, A.L. 2013. Is information-centric multi-tree routing feasible? SIGCOMM Comput. Commun. Rev. 43, 4, 3–8. https://doi.org/10.1145/2534169.2491230.

Cc, S., Raychoudhury, V., Marfia, G., and Singla, A. 2016. A survey of routing and data dissemination in delay tolerant networks. Journal of Network and Computer Applications 67, 128–146. https://doi.org/10.1016/j.jnca.2016.01.002.

Chen, M. 2014. NDNC-BAN: Supporting rich media healthcare services via named data networking in cloud-assisted wireless body area networks. Information sciences 284, 142–156. https://doi.org/10.1016/j.ins.2014.06.023.

Chen, M., Ong Mau, D., Zhang, Y., Taleb, T., and Leung, V.C.M. 2014a. VENDNET: VEhicular named data NETwork. Vehicular Communications 1, 4, 208–213. https://doi.org/10.1016/j.vehcom.2014.09.002.

Chen, Q., Xie, R., Yu, F.R., Liu, J., Huang, T., and Liu, Y. 2016. Transport control strategies in named data networking: A survey. IEEE Communications Surveys Tutorials 18, 3, 2052–2083. https://doi.org/10.1109/COMST.2016.2528164.

Chen, T., Lei, K., and Xu, K. 2014b. An encryption and probability based access control model for named data networking. 2014 IEEE 33rd international performance computing and communications conference (IPCCC), ieeexplore.ieee.org, 1–8. https://doi.org/10.1109/PCCC.2014.7017100.

Chengming, L.I., Wenjing, L., and Okamura, K. 2013. A greedy ant colony forwarding algorithm for named data networking. Proceedings of the Asia-Pacific Advanced Network 34, 0, 17–26. https://doi.org/10.7125/APAN.34.3.

Choi, H. g., Yoo, J., Chung, T., Choi, N., Kwon, T.T., and Choi, Y. 2014a. CoRC: Coordinated routing and caching for named data networking. 2014 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 161–172.

Choi, H.-G., Yoo, J., Chung, T., Choi, N., Kwon, T., and Choi, Y. 2014b. CoRC: Coordinated routing and caching for named data networking. Proceedings of the tenth ACM/IEEE symposium on architectures for networking and communications systems, ACM, 161–172. https://doi.org/10.1145/2658260.2658275.

Compagno, A., Conti, M., Gasti, P., Mancini, L.V., and Tsudik, G. 2015. Violating consumer anonymity: Geo-Locating nodes in named data networking. Applied cryptography and network security, Springer, Cham, 243–262. https://doi.org/10.1007/978-3-319-28166-7\_12.

Compagno, A., Conti, M., Gasti, P., and Tsudik, G. 2013. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. 38th annual IEEE conference on local computer networks, ieeexplore.ieee.org, 630–638. https://doi.org/10.1109/LCN.2013.6761300.

Compagno, A., Yz, P.G., and Tsudik, G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking..

Conti, M., Gasti, P., and Teoli, M. 2013. A lightweight mechanism for detection of cache pollution attacks in named data networking. Computer Networks 57, 16, 3178–3191. https://doi.org/10.1016/j.comnet.2013.07.034.

Corujo, D., Aguiar, R.L., Vidal, I., and Garcia-Reinoso, J. 2012. A named data networking flexible framework for management communications. IEEE Communications Magazine 50, 12, 36–43. https://doi.org/10.1109/MCOM.2012.6384449.

Crowley, P. 2013. Named data networking. China-America frontiers of engineering symposium, frontiers of engineering, cse.wustl.edu.

Cui, X., Hui, L.C.K., Yiu, S.M., and Tsang, Y.H. 2016a. Study of censorship in named data networking. In: Advanced multimedia and ubiquitous engineering. Springer, Berlin, Heidelberg, 145–152. https://doi.org/10.1007/978-3-662-47895-0\_18.

Cui, X., Tsang, Y.H., Hui, L.C.K., Yiu, S.M., and Luo, B. 2016b. Defend against internet censorship in named data networking. 2016 18th international conference on advanced communication technology (ICACT), 1–1. https://doi.org/10.1109/ICACT.2016.7423367.

Cui, Y., Lai, F., Yeh, E., and Liu, R. 2016c. Enhanced VIP algorithms for forwarding, caching, and congestion control in named data networks. 2016 IEEE global communications conference (GLOBECOM), 1–7. https://doi.org/10.1109/GLOCOM.2016.7841814.

Dai, H. and Liu, B. 2016. CONSERT: Constructing optimal name-based routing tables. Computer Networks 94, 62–79. https://doi.org/10.1016/j.comnet.2015.11.020.

Dai, H., Liu, B., Chen, Y., and Wang, Y. 2012a. On pending interest table in named data networking. Proceedings of the eighth ACM/IEEE symposium on architectures for networking and communications systems, ACM, 211–222. https://doi.org/10.1145/2396556.2396600.

Dai, H., Liu, B., Chen, Y., and Wang, Y. 2012b. On pending interest table in named data networking. 2012 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 211–222.

Dai, H., Lu, J., Wang, Y., and Liu, B. 2012c. A two-layer intra-domain routing scheme for named data networking. 2012 IEEE global communications conference (GLOBECOM), ieeexplore.ieee.org, 2815–2820. https://doi.org/10.1109/GLOCOM.2012.6503543.

Dai, H., Lu, J., Wang, Y., and Liu, B. 2015. BFAST: Unified and scalable index for NDN forwarding architecture. 2015 IEEE conference on computer communications (INFOCOM), ieeexplore.ieee.org, 2290–2298. https://doi.org/10.1109/INFOCOM.2015.7218616.

Dai, H., Wang, Y., Fan, J., and Liu, B. 2013. Mitigate DDoS attacks in NDN by interest traceback. 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 381–386. https://doi.org/10.1109/INFCOMW.2013.6970722.

Dai, H., Wang, Y., Wu, H., Lu, J., and Liu, B. 2014. Towards line-speed and accurate on-line popularity monitoring on NDN routers. 2014 IEEE 22nd international symposium of quality of service (IWQoS), ieeexplore.ieee.org, 178–187. https://doi.org/10.1109/IWQoS.2014.6914318.

Datta, S.K. and Bonnet, C. 2016. Integrating named data networking in internet of things architecture. 2016 IEEE international conference on consumer Electronics-Taiwan (ICCE-TW), ieeexplore.ieee.org, 1–2. https://doi.org/10.1109/ICCE-TW.2016.7520967.

De Silva, U., Lertsinsrubtavee, A., Sathiaseelan, A., and Kanchanasut, K. 2016. Named data networking based smart home lighting. Proceedings of the 2016 ACM SIGCOMM conference, ACM, 573–574. https://doi.org/10.1145/2934872.2959055.

Deng, G., Shi, L., Li, R., and Xie, X. 2015a. Efficient Inter-Vehicle internet content distribution based on named data. 2015 IEEE 82nd vehicular technology conference (VTC2015-Fall), ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/VTCFall.2015.7390913.

Deng, G., Xie, X., Shi, L., and Li, R. 2015b. Hybrid information forwarding in VANETs through named data networking. 2015 IEEE 26th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), ieeexplore.ieee.org, 1940–1944. https://doi.org/10.1109/PIMRC.2015.7343616.

DiBenedetto, S., Gasti, P., Tsudik, G., and Uzun, E. 2011a. ANDaNA: Anonymous named data networking application..

DiBenedetto, S., Papadopoulos, C., and Massey, D. 2011b. Routing policies in named data networking. Proceedings of the ACM SIGCOMM workshop on information-centric networking, ACM, 38–43. https://doi.org/10.1145/2018584.2018595.

Ding, K., Liu, Y., Cho, H.-H., Chao, H.-C., and Shih, T.K. 2016a. Cooperative detection and protection for interest flooding attacks in named data networking. International Journal of Communication Systems 29, 13, 1968–1980. https://doi.org/10.1002/dac.2883.

Ding, W., Yan, Z., and Deng, R.H. 2016b. A survey on future internet security architectures. IEEE Access 4, 4374–4393. https://doi.org/10.1109/ACCESS.2016.2596705.

Dogruluk, E., Costa, A., and Macedo, J. 2016. Evaluating privacy attacks in named data network. 2016 IEEE symposium on computers and communication (ISCC), 1251–1256. https://doi.org/10.1109/ISCC.2016.7543908.

Drira, W. and Filali, F. 2014a. A Pub/Sub extension to NDN for efficient data collection and dissemination in V2X networks. Proceeding of IEEE international symposium on a world of wireless, mobile and multimedia networks 2014, ieeexplore.ieee.org, 1–7. https://doi.org/10.1109/WoWMoM.2014.6918991.

Drira, W. and Filali, F. 2014b. NDN-Q: An NDN query mechanism for efficient V2X data collection. 2014 eleventh annual IEEE international conference on sensing, communication, and networking workshops (SECON workshops), ieeexplore.ieee.org, 13–18. https://doi.org/10.1109/SECONW.2014.6979698.

Dron, W., Leung, A., Uddin, M., Wang, S., Abdelzaher, T., Govindan, R., and Hancock, J. 2013. Information-maximizing caching in ad hoc networks with named data networking. 2013 IEEE 2nd network science workshop (NSW), ieeexplore.ieee.org, 90–93. https://doi.org/10.1109/NSW.2013.6609199.

Dynerowicz, S., Aponte, O., and Mendes, P. 2017. NDN operation in opportunistic wireless networks. NDNComm2017, Memphis, USA.

Etefia, B., Gerla, M., and Zhang, L. 2012. Supporting military communications with named data networking: An emulation analysis. MILCOM 2012 - 2012 IEEE military communications conference, ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/MILCOM.2012.6415685.

Etefia, B. and Zhang, L. 2012. Named data networking for military communication systems. 2012 IEEE aerospace conference, ieeexplore.ieee.org, 1–7. https://doi.org/10.1109/AERO.2012.6187109.

Fan, C.I., Chen, I.T., Cheng, C.K., Huang, J.J., and Chen, W.T. 2017. FTP-NDN: File transfer protocol based on Re-Encryption for named data network supporting nondesignated receivers. IEEE Systems Journal PP, 99, 1–12. https://doi.org/10.1109/JSYST.2016.2580299.

Fan, C., Shannigrahi, S., DiBenedetto, S., Olschanowsky, C., Papadopoulos, C., and Newman, H. 2015. Managing scientific data with named data networking. Proceedings of the fifth international workshop on Network-Aware data management, ACM, 1:1–1:7. https://doi.org/10.1145/2832099.2832100.

Feng, T. and Liu, N. 2017. A sensitive information protection scheme in named data networking using Attribute-Based Ring-Signcryption. 2017 IEEE second international conference on data science in cyberspace (DSC), 187–194. https://doi.org/10.1109/DSC.2017.67.

Fesehaye, D. and Wei, J. 2014. SNC: Scalable NDN-based conferencing architecture. 2014 IEEE 11th consumer communications and networking conference (CCNC), ieeexplore.ieee.org, 872–880. https://doi.org/10.1109/CCNC.2014.6940498.

Gao, M., Zhu, X., and Su, Y. 2015. Protecting router cache privacy in named data networking. 2015 IEEE/CIC international conference on communications in china (ICCC), 1–5. https://doi.org/10.1109/ICCChina.2015.7448754.

Gao, S., Zhang, H., and Zhang, B. 2016. Energy efficient interest forwarding in NDN-Based wireless sensor networks. Mobile Information Systems 2016. https://doi.org/10.1155/2016/3127029.

Garcia-Luna-Aceves, J.J. 2015. New directions in content centric networking. 2015 IEEE 12th international conference on mobile ad hoc and sensor systems, ieeexplore.ieee.org, 494–499. https://doi.org/10.1109/MASS.2015.86.

Garcia-Luna-Aceves, J.J. and Barijough, M.M. 2016. Content-centric networking using anonymous datagrams. 2016 IFIP networking conference (IFIP networking) and workshops, ieeexplore.ieee.org, 171–179. https://doi.org/10.1109/IFIPNetworking.2016.7497197.

Ge, J., Wang, S., Wu, Y., Tang, H., and Yuepeng, E. 2016. Performance improvement for source mobility in named data networking based on global–local FIB updates. Peer-to-Peer Networking and Applications 9, 4, 670–680. https://doi.org/10.1007/s12083-015-0353-z.

Ghali, C., Narayanan, A., Oran, D., Tsudik, G., and Wood, C.A. 2015. Secure fragmentation for Content-Centric networks. 2015 IEEE 14th international symposium on network computing and applications, ieeexplore.ieee.org, 47–56. https://doi.org/10.1109/NCA.2015.34.

Ghali, C., Tsudik, G., and Uzun, E. 2014a. Needle in a haystack: Mitigating content poisoning in named-data networking. Proceedings of NDSS workshop on security of emerging networking technologies (SENT), sprout.ics.uci.edu.

Ghali, C., Tsudik, G., and Uzun, E. 2014b. Network-Layer trust in Named-Data networking. SIGCOMM Comput. Commun. Rev. 44, 5, 12–19. https://doi.org/10.1145/2677046.2677049.

Gong, L., Wang, J., Zhang, X., and Lei, K. 2016. Intelligent forwarding strategy based on online machine learning in named data networking. 2016 IEEE Trustcom/BigDataSE/ISPA, 1288–1294. https://doi.org/10.1109/TrustCom.2016.0206.

Grassi, G., Pesavento, D., Pau, G., Vuyyuru, R., Wakikawa, R., and Zhang, L. 2014. VANET via named data networking. 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 410–415. https://doi.org/10.1109/INFCOMW.2014.6849267.

Grassi, G., Pesavento, D., Pau, G., Zhang, L., and Fdida, S. 2015. Navigo: Interest forwarding by geolocations in vehicular named data networking. 2015 IEEE 16th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), ieeexplore.ieee.org, 1–10. https://doi.org/10.1109/WoWMoM.2015.7158165.

Grassi, G., Pesavento, D., Wang, L., Pau, G., Vuyyuru, R., Wakikawa, R., and Zhang, L. 2013. ACM HotMobile 2013 poster: Vehicular inter-networking via named data. SIGMOBILE Mob. Comput. Commun. Rev. 17, 3, 23–24. https://doi.org/10.1145/2542095.2542108.

Gusev, P. and Burke, J. 2015. NDN-RTC: Real-Time videoconferencing over named data networking. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 117–126. https://doi.org/10.1145/2810156.2810176.

Hahm, O., Baccelli, E., Schmidt, T., Wählisch, M., Adjih, C., and Massoulié, L. 2017. Low-power internet of things with NDN & cooperative caching. ACM ICN 2017-4th ACM conference on Information-Centric networking, hal.inria.fr.

Hail, M.A., Amadeo, M., Molinaro, A., and Fischer, S. 2015. Caching in named data networking for the wireless internet of things. 2015 international conference on recent advances in internet of things (RIoT), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/RIOT.2015.7104902.

Hamdane, B., Boussada, R., Elhdhili, M.E., and Fatmi, S.G.E. 2017a. Towards a secure access to content in named data networking. 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (WETICE), 250–255. https://doi.org/10.1109/WETICE.2017.32.

Hamdane, B., Boussada, R., Elhdhili, M.E., and Fatmi, S.G.E. 2017b. Hierarchical identity based cryptography for security and trust in named data networking. 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (WETICE), 226–231. https://doi.org/10.1109/WETICE.2017.33.

Hamdane, B., Msahli, M., Serhrouchni, A., and Fatmi, S.G.E. 2013a. Data-based access control in named data networking. 9th IEEE international conference on collaborative computing: Networking, applications and worksharing, ieeexplore.ieee.org, 531–536. https://doi.org/10.4108/icst.collaboratecom.2013.254180.

Hamdane, B., Serhrouchni, A., Fadlallah, A., and Fatmi, S.G.E. 2012. Named-Data security scheme for named data networking. 2012 third international conference on the network of the future (NOF), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/NOF.2012.6464002.

Hamdane, B., Serhrouchni, A., and Fatmi, S.G.E. 2013b. Access control enforcement in named data networking. 8th international conference for internet technology and secured transactions (ICITST-2013), ieeexplore.ieee.org, 576–581. https://doi.org/10.1109/ICITST.2013.6750268.

Han, B., Wang, X., Choi, N., Kwon, T., and Choi, Y. 2013. AMVS-NDN: Adaptive mobile video streaming and sharing in wireless named data networking. 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 375–380. https://doi.org/10.1109/INFCOMW.2013.6970721.

Han, S. and Woo, H. 2016. NDN-Based Pub/Sub system for scalable IoT cloud. 2016 IEEE international conference on cloud computing technology and science (CloudCom), ieeexplore.ieee.org, 488–491. https://doi.org/10.1109/CloudCom.2016.0085.

Hemanathan, V. and Anusha, N. 2015. Role based content access control in NDN. Journal of Innovative Technology and Education 2, 1, 65–73.

Hoque, A.K.M.M., Amin, S.O., Alyyan, A., Zhang, B., Zhang, L., and Wang, L. 2013. NLSR: Named-data link state routing protocol. Proceedings of the 3rd ACM SIGCOMM workshop on information-centric networking, ACM, 15–20. https://doi.org/10.1145/2491224.2491231.

Hou, R., Chang, Y., and Yang, L. 2017. Multi-constrained QoS routing based on PSO for named data networking. IET Communications 11, 8, 1251–1255. https://doi.org/10.1049/iet-com.2016.0783.

Hwang, I., Kim, D., and Ko, Y.-B.B. 2016a. Analysis of NDN repository architectures. High performance computing & simulation (HPCS), 2016 international conference on, 985–988.

Hwang, I., Kim, D., and Ko, Y.B. 2016b. Analysis of NDN repository architectures. 2016 international conference on high performance computing simulation (HPCS), ieeexplore.ieee.org, 985–988. https://doi.org/10.1109/HPCSim.2016.7568442.

Ito, D., Mohri, M., Shiraishi, Y., and Morii, M. 2017. Virtual storage and area limited data delivery over named data networking. 2017 14th IEEE annual consumer communications networking conference (CCNC), 95–102. https://doi.org/10.1109/CCNC.2017.7983088.

Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M., Briggs, N., and Braynard, R. 2012. Networking named content. Communications of the ACM 55, 1, 117–124. https://doi.org/10.1145/2063176.2063204.

Jiang, X. and Bi, J. 2013. Interest set mechanism to improve the transport of named data networking. SIGCOMM Comput. Commun. Rev. 43, 4, 515–516. https://doi.org/10.1145/2534169.2491723.

Jiang, X. and Bi, J. 2014. nCDN: CDN enhanced with NDN. 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 440–445. https://doi.org/10.1109/INFCOMW.2014.6849272.

Jiang, X. and Bi, J. 2016. IS: Interest set to enhance flow transmission in named-data networking. China Communications 13, Supplement 1, 65–71. https://doi.org/10.1109/CC.0.7560896.

Jiang, X., Bi, J., and Wang, Y. 2014. What benefits does NDN have in supporting mobility. 2014 IEEE symposium on computers and communications (ISCC), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/ISCC.2014.6912464.

Jiang, X., Bi, J., Wang, Y., Li, P., and Li, Z. 2012a. An easy matrix computation based simulator of NDN. 2012 third international conference on networking and distributed computing, ieeexplore.ieee.org, 36–39. https://doi.org/10.1109/ICNDC.2012.17.

Jiang, X., Bi, J., Wang, Y., Lin, P., and Li, Z. 2012b. A content provider mobility solution of named data networking. 2012 20th IEEE international conference on network protocols (ICNP), ieeexplore.ieee.org, 1–2. https://doi.org/10.1109/ICNP.2012.6459937.

Jin, T., Zhang, X., Liu, Y., and Lei, K. 2017. BlockNDN: A bitcoin blockchain decentralized system over named data networking. 2017 ninth international conference on ubiquitous and future networks (ICUFN), 75–80. https://doi.org/10.1109/ICUFN.2017.7993751.

Jung, E. 2015. A persistent web data architecture with named data networking. In: Advances in computer science and ubiquitous computing. Springer, Singapore, 153–158. https://doi.org/10.1007/978-981-10-0281-6\_22.

Jung, E. 2016. A design of alias naming scheme for namespace in named data networking. 2016 18th international conference on advanced communication technology (ICACT), 1–1. https://doi.org/10.1109/ICACT.2016.7423461.

Kalghoum, A., Gammar, S.M., and Saidane, L.A. 2017. Towards a novel cache replacement strategy for named data networking based on software defined networking. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.12.025.

Karami, A. 2015. ACCPndn: Adaptive congestion control protocol in named data networking by learning capacities using optimized Time-Lagged feedforward neural network. Journal of Network and Computer Applications 56, 1–18. https://doi.org/10.1016/j.jnca.2015.05.017.

Karami, A. and Guerrero-Zapata, M. 2015a. A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in named data networking. Neurocomputing 151, 1262–1282. https://doi.org/10.1016/j.neucom.2014.11.003.

Karami, A. and Guerrero-Zapata, M. 2015b. An ANFIS-based cache replacement method for mitigating cache pollution attacks in named data networking. Computer Networks 80, 51–65. https://doi.org/10.1016/j.comnet.2015.01.020.

Kato, T. and Bandai, M. 2017. Congestion control avoiding excessive rate reduction in named data network. 2017 14th IEEE annual consumer communications networking conference (CCNC), 108–113. https://doi.org/10.1109/CCNC.2017.7983090.

Kerrouche, A., Senouci, M.R., Mellouk, A., and Abreu, T. 2017. AC-QoS-FS: Ant colony based QoS-aware forwarding strategy for routing in named data networking. 2017 IEEE international conference on communications (ICC), 1–6. https://doi.org/10.1109/ICC.2017.7996960.

Kietzmann, P., Gündoğan, C., Schmidt, T.C., Hahm, O., and Wählisch, M. 2017. The need for a name to MAC address mapping in NDN: Towards quantifying the resource gain. Proceedings of the 4th ACM conference on Information-Centric networking, ACM, 36–42. https://doi.org/10.1145/3125719.3125737.

Kim, D., Hwang, I., Srivastava, V., Ko, Y.B., and Lim, H. 2015a. Implementation of a front-end and back-end NDN system for climate modeling application. 2015 international conference on information and communication technology convergence (ICTC), ieeexplore.ieee.org, 554–559. https://doi.org/10.1109/ICTC.2015.7354608.

Kim, D. and Kim, Y. 2017. Enhancing NDN feasibility via dedicated routing and caching. Computer Networks 126, 218–228. https://doi.org/10.1016/j.comnet.2017.07.011.

Kim, D., Nam, S., Bi, J., and Yeom, I. 2015b. Efficient content verification in named data networking. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 109–116. https://doi.org/10.1145/2810156.2810165.

Kim, S., Urata, Y., Koizumi, Y., and Hasegawa, T. 2015c. Power-saving NDN-based message delivery based on collaborative communication in disasters. The 21st IEEE international workshop on local and metropolitan area networks, ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/LANMAN.2015.7114733.

Kim, Y., Kim, Y., Bi, J., and Yeom, I. 2016. Differentiated forwarding and caching in named-data networking. Journal of Network and Computer Applications 60, 155–169. https://doi.org/10.1016/j.jnca.2015.09.011.

Kim, Y. and Yeom, I. 2013. Performance analysis of in-network caching for content-centric networking. Computer Networks 57, 13, 2465–2482. https://doi.org/10.1016/j.comnet.2012.11.026.

Ko, H., Kim, Y., Suh, D., and Pack, S. 2014. A proactive content pushing scheme for provider mobility support in information centric networks. 2014 IEEE 11th consumer communications and networking conference (CCNC), ieeexplore.ieee.org, 523–524. https://doi.org/10.1109/CCNC.2014.6994423.

Lailari, Z., Abraham, H.B., Aronberg, B., Hudepohl, J., Yuan, H., DeHart, J., Parwatikar, J., and Crowley, P. 2015. Experiments with the emulated NDN testbed in ONL. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 219–220. https://doi.org/10.1145/2810156.2812616.

Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., and Kirda, E. 2012a. Privacy implications of ubiquitous caching in named data networking architectures. Technical Report TR-iSecLab-0812-001, ISecLab, Tech. Rep.

Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., and Kirda, E. 2012b. Privacy risks in named data networking: What is the cost of performance? SIGCOMM Comput. Commun. Rev. 42, 5, 54–57. https://doi.org/10.1145/2378956.2378966.

Lee, J., Kapoor, A., Amin, M.T.A., Wang, Z., Zhang, Z., Goyal, R., and Abdelzaher, T. 2015. InfoMax: An information maximizing transport layer protocol for named data networks. 2015 24th international conference on computer communication and networks (ICCCN), 1–10. https://doi.org/10.1109/ICCCN.2015.7288420.

Lee, S., Kim, Y., Yeom, I., and Kim, Y. 2017. Active request management in stateful forwarding networks. Journal of Network and Computer Applications 93, 137–149. https://doi.org/10.1016/j.jnca.2017.05.011.

Lehmann, M.B., Barcellos, M.P., and Mauthe, A. 2016. Providing producer mobility support in NDN through proactive data replication. NOMS 2016 - 2016 IEEE/IFIP network operations and management symposium, ieeexplore.ieee.org, 383–391. https://doi.org/10.1109/NOMS.2016.7502835.

Lei, K., Hou, C., Li, L., and Xu, K. 2015a. A RCP-Based congestion control protocol in named data networking. 2015 international conference on Cyber-Enabled distributed computing and knowledge discovery, ieeexplore.ieee.org, 538–541. https://doi.org/10.1109/CyberC.2015.67.

Lei, K., Wang, J., and Yuan, J. 2015b. An entropy-based probabilistic forwarding strategy in named data networking. 2015 IEEE international conference on communications (ICC), 5665–5671. https://doi.org/10.1109/ICC.2015.7249225.

Lei, K., Xun, Y., Yu, L., Chen, T., and Tan, Z. 2015c. NDN-Hippo: A streaming media system over named data networking. 2015 6th international conference on computing, communication and networking technologies (ICCCNT), 1–7. https://doi.org/10.1109/ICCCNT.2015.7395232.

Lertsinsrubtavee, A., Mekbungwan, P., and Weshsuwannarugs, N. 2014. Comparing NDN and CDN performance for content distribution service in community wireless mesh network. Proceedings of the AINTEC 2014 on asian internet engineering conference, ACM, 43:43–43:50. https://doi.org/10.1145/2684793.2684800.

Li, D., Li, J., and Du, Z. 2016a. An improved trie-based name lookup scheme for named data networking. 2016 IEEE symposium on computers and communication (ISCC), 1294–1296. https://doi.org/10.1109/ISCC.2016.7543915.

Li, H., Li, Y., Zhao, Z., Lin, T., Tang, H., and Ci, S. 2012a. A SIP-based real-time traffic mobility support scheme in named data networking. Journal of Networks 7, 6, 918–925.

Li, J., Shi, S., Ren, Y., Li, L., and Zhi, J. 2016b. A content Store-Based module for congestion control algorithms of named data networking. 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), 253–259. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0045.

Li, J., Wu, H., Liu, B., and Lu, J. 2012b. Effective caching schemes for minimizing Inter-ISP traffic in named data networking. 2012 IEEE 18th international conference on parallel and distributed systems, ieeexplore.ieee.org, 580–587. https://doi.org/10.1109/ICPADS.2012.84.

Li, J., Wu, H., Liu, B., Lu, J., Wang, Y., Wang, X., Zhang, Y., and Dong, L. 2012c. Popularity-driven coordinated caching in named data networking. Proceedings of the eighth ACM/IEEE symposium on architectures for networking and communications systems, ACM, 15–26. https://doi.org/10.1145/2396556.2396561.

Li, J., Wu, H., Liu, B., Lu, J., Wang, Y., Wang, X., Zhang, Y., and Dong, L. 2012d. Popularity-driven coordinated caching in named data networking. 2012 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 15–26.

Li, M., Pei, D., Zhang, X., Zhang, B., and Xu, K. 2015a. NDN live video broadcasting over wireless LAN. 2015 24th international conference on computer communication and networks (ICCCN), ieeexplore.ieee.org, 1–7. https://doi.org/10.1109/ICCCN.2015.7288434.

Li, Q., Zhang, X., Zheng, Q., Sandhu, R., and Fu, X. 2015b. LIVE: Lightweight integrity verification and content access control for named data networking. IEEE Transactions on Information Forensics and Security 10, 2, 308–320. https://doi.org/10.1109/TIFS.2014.2365742.

Li, Q., Zhao, Z., Xu, M., Jiang, Y., and Yang, Y. 2017. A smart routing scheme for named data networks. Computer communications 103, 83–93. https://doi.org/10.1016/j.comcom.2016.09.012.

Li, Y., Zhang, D., Yu, X., Liang, W., Long, J., and Qiao, H. 2014a. Accelerate NDN name lookup using FPGA: Challenges and a scalable approach. 2014 24th international conference on field programmable logic and applications (FPL), ieeexplore.ieee.org, 1–4. https://doi.org/10.1109/FPL.2014.6927403.

Li, Z., Chen, Y., Shi, H., and Liu, K. 2016c. NDN-GSM-R: A novel high-speed railway communication system via named data networking. EURASIP Journal on Wireless Communications and Networking 2016, 1, 48. https://doi.org/10.1186/s13638-016-0554-z.

Li, Z., Liu, K., Zhao, Y., and Ma, Y. 2014b. MaPIT: An enhanced pending interest table for NDN with mapping bloom filter. IEEE Communications Letters 18, 11, 1915–1918. https://doi.org/10.1109/LCOMM.2014.2359191.

Lin, Z., Kuai, M., and Hong, X. 2016. Reliable forwarding strategy in vehicular networks using NDN. 2016 IEEE 84th vehicular technology conference (VTC-Fall), ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/VTCFall.2016.7881195.

Lindblom, J., Huang, M.-C., Burke, J., and Zhang, L. 2013. FileSync/NDN: Peer-to-peer file sync over named data networking. NDN Technical Report NDN-0012.

Liu, B., Jiang, T., Wang, Z., and Cao, Y. 2017. Object-Oriented network: A Named-Data architecture toward the future internet. IEEE Internet of Things Journal 4, 4, 957–967. https://doi.org/10.1109/JIOT.2017.2714658.

Liu, Y. and Wadekar, H. 2016. SDAR: Software defined Intra-Domain routing in named data networks. 2016 IEEE 15th international symposium on network computing and applications (NCA), 158–161. https://doi.org/10.1109/NCA.2016.7778611.

Mai, H.L., Nguyen, N.T., Doyen, G., Ploix, A., and Cogranne, R. 2016. On the readiness of NDN for a secure deployment: The case of pending interest table. Management and security in the age of hyperconnectivity, Springer, Cham, 98–110. https://doi.org/10.1007/978-3-319-39814-3\_10.

Majeed, M.F., Dailey, M.N., Khan, R., and Tunpan, A. 2017. Pre-caching: A proactive scheme for caching video traffic in named data mesh networks. Journal of Network and Computer Applications 87, 116–130. https://doi.org/10.1016/j.jnca.2017.03.012.

Mansilha, R.B., Barcellos, M.P., Leonardi, E., and Rossi, D. 2017. Exploiting parallelism in hierarchical content stores for high-speed ICN routers. Computer Networks 125, 132–145. https://doi.org/10.1016/j.comnet.2017.04.041.

Marchal, X., Aoun, M.E., Mathieu, B., Mallouli, W., Cholez, T., Doyen, G., Truong, P., Ploix, A., and De Oca, E.M. 2016a. A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. Proceedings of the 3rd ACM conference on Information-Centric networking, ACM, 225–226. https://doi.org/10.1145/2984356.2985238.

Marchal, X., Cholez, T., and Festor, O. 2016b. Server-side performance evaluation of NDN. Proceedings of the 3rd ACM conference on Information-Centric networking, ACM, 148–153. https://doi.org/10.1145/2984356.2984364.

Massawe, E.A., Du, S., and Zhu, H. 2013. A scalable and Privacy-Preserving named data networking architecture based on bloom filters. 2013 IEEE 33rd international conference on distributed computing systems workshops, ieeexplore.ieee.org, 22–26. https://doi.org/10.1109/ICDCSW.2013.32.

Mastorakis, S., Afanasyev, A., Yu, Y., and Zhang, L. 2017a. NTorrent: Peer-to-Peer file sharing in named data networking. 2017 26th international conference on computer communication and networks (ICCCN), 1–10. https://doi.org/10.1109/ICCCN.2017.8038462.

Mastorakis, S., Afanasyev, A., and Zhang, L. 2017b. On the evolution of ndnSIM: An Open-Source simulator for NDN experimentation. SIGCOMM Comput. Commun. Rev. 47, 3, 19–33. https://doi.org/10.1145/3138808.3138812.

Mauri, G. and Verticale, G. 2013. Distributing key revocation status in named data networking. Advances in communication networking, Springer, Berlin, Heidelberg, 310–313. https://doi.org/10.1007/978-3-642-40552-5\_31.

Meisel, M., Pappas, V., and Zhang, L. 2010. Ad hoc networking via named data. Proceedings of the fifth ACM international workshop on mobility in the evolving internet architecture, ACM, 3–8. https://doi.org/10.1145/1859983.1859986.

Mejri, S., Touati, H., and Kamoun, F. 2016. Preventing unnecessary interests retransmission in named data networking. 2016 international symposium on networks, computers and communications (ISNCC), 1–6. https://doi.org/10.1109/ISNCC.2016.7746058.

Mekinda, L. and Muscariello, L. 2016. Supervised machine Learning-Based routing for named data networking. 2016 IEEE global communications conference (GLOBECOM), 1–6. https://doi.org/10.1109/GLOCOM.2016.7842307.

Moiseenko, I. 2014. Fetching content in named data networking with embedded manifests. Technical Report NDN-0025, NDN; named-data.net.

Moiseenko, I., Stapp, M., and Oran, D. 2014. Communication patterns for web interaction in named data networking. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 87–96. https://doi.org/10.1145/2660129.2660152.

Moiseenko, I., Wang, L., and Zhang, L. 2015. Consumer / producer communication with application level framing in named data networking. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 99–108. https://doi.org/10.1145/2810156.2810160.

Moiseenko, I. and Zhang, L. 2014. Consumer-producer API for named data networking. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 177–178. https://doi.org/10.1145/2660129.2660158.

Moll, P., Posch, D., and Hellwagner, H. 2017. Investigation of push-based traffic for conversational services in named data networking. 2017 IEEE international conference on multimedia expo workshops (ICMEW), 315–320. https://doi.org/10.1109/ICMEW.2017.8026212.

Monteiro, K., Marot, M., and Ibn-khedher, H. 2017. Review on microgrid communications solutions: A named data networking #8211; fog approach. 2017 16th annual mediterranean ad hoc networking workshop (Med-Hoc-Net), 1–8. https://doi.org/10.1109/MedHocNet.2017.8001656.

Moon, C., Han, S., Woo, H., and Kim, D. 2016. Named data networking for infrastructure wireless networks. 2016 IEEE international conference on consumer electronics (ICCE), 343–344. https://doi.org/10.1109/ICCE.2016.7430640.

Mori, K., Kamimoto, T., and Shigeno, H. 2015. Push-Based Traffic-Aware cache management in named data networking. 2015 18th international conference on Network-Based information systems, 309–316. https://doi.org/10.1109/NBiS.2015.48.

Mun, J.H. and Lim, H. 2017. Cache sharing using bloom filters in named data networking. Journal of Network and Computer Applications 90, 74–82. https://doi.org/10.1016/j.jnca.2017.04.011.

Muñoz, C., Wang, L., Solana, E., and Crowcroft, J. 2017. I(FIB)F: Iterated bloom filters for routing in named data networks. 2017 international conference on networked systems (NetSys), 1–8. https://doi.org/10.1109/NetSys.2017.7903945.

Muto, T., Kanai, K., and Katto, J. 2015. Implementation evaluation of proactive content caching using DASH-NDN-JS. 2015 IEEE wireless communications and networking conference (WCNC), ieeexplore.ieee.org, 2239–2244. https://doi.org/10.1109/WCNC.2015.7127815.

Narayanan, A. and Oran, D. 2011. NDN and IP routing: Can it scale? Proposed Information-Centric networking research group (ICNRG), side meeting at IETF-82, researchgate.net.

Nguyen, T., Marchal, X., Doyen, G., Cholez, T., and Cogranne, R. 2017. Content poisoning in named data networking: Comprehensive characterization of real deployment. 2017 IFIP/IEEE symposium on integrated network and service management (IM), 72–80. https://doi.org/10.23919/INM.2017.7987266.

Nguyen, T.N., Cogranne, R., Doyen, G., and Retraint, F. 2015. Detection of interest flooding attacks in named data networking using hypothesis testing. 2015 IEEE international workshop on information forensics and security (WIFS), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/WIFS.2015.7368571.

Ni, A. and Lim, H. 2015. A named data networking testbed with global NDN connection. 한국통신학회논문지 40, 12, 2419–2426.

Ni, J., Tan, X., Shao, Y., Wu, X., and Zhu, J. 2017. QoE-driven rate adaptation algorithm for fair dynamic adaptive video streaming in named data networking. 2017 36th chinese control conference (CCC), 7599–7604. https://doi.org/10.23919/ChiCC.2017.8028557.

Ntuli, N. and Han, S. 2012. Detecting router cache snooping in named data networking. 2012 international conference on ICT convergence (ICTC), ieeexplore.ieee.org, 714–718. https://doi.org/10.1109/ICTC.2012.6387155.

Ogawara, T., Kawahara, Y., and Asami, T. 2013a. Information dissemination performance of a disaster-tolerant NDN-based distributed application in disrupted cellular networks. IEEE P2P 2013 proceedings, ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/P2P.2013.6688722.

Ogawara, T., Kawahara, Y., and Asami, T. 2013b. Disaster-tolerant authentication system for NDN using hierarchical ID-Based encryption. 2013 21st IEEE international conference on network protocols (ICNP), ieeexplore.ieee.org, 1–2. https://doi.org/10.1109/ICNP.2013.6733631.

Ohara, M. and Fukumoto, S. 2017. Off-Path caching for file versioning in named data networking. 2017 47th annual IEEE/IFIP international conference on dependable systems and networks workshops (DSN-W), 107–108. https://doi.org/10.1109/DSN-W.2017.15.

Ohsugi, K., Takemasa, J., Koizumi, Y., Hasegawa, T., and Psaras, I. 2016. Power consumption model of NDN-Based multicore software router based on detailed protocol analysis. IEEE Journal on Selected Areas in Communications 34, 5, 1631–1644. https://doi.org/10.1109/JSAC.2016.2520278.

Olschanowsky, C., Shannigrahi, S., and Papadopoulos, C. 2014. Supporting climate research using named data networking. 2014 IEEE 20th international workshop on local metropolitan area networks (LANMAN), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/LANMAN.2014.7028640.

Oran, D.R. and Narayanan, A. 2016. Congestion control using congestion prefix information in a named data networking environment. https://patentimages.storage.googleapis.com/24/ef/87/483ba04b8341b2/US9270598.pdf.

Paknezhad, M. and Keshtgary, M. 2014. Security and privacy issues of implementing cloud computing on NDN. Journal of Basic and Applied Scientific Research 4, 3, 270–279.

Pan, J., Paul, S., and Jain, R. 2011. A survey of the research on future internet architectures. IEEE Communications Magazine 49, 7, 26–36. https://doi.org/10.1109/MCOM.2011.5936152.

Park, H., Jang, H., and Kwon, T. 2014. Popularity-based congestion control in named data networking. 2014 sixth international conference on ubiquitous and future networks (ICUFN), ieeexplore.ieee.org, 166–171. https://doi.org/10.1109/ICUFN.2014.6876774.

Perez, V., Garip, M.T., Lam, S., and Zhang, L. 2013. Security evaluation of a control system using named data networking. 2013 21st IEEE international conference on network protocols (ICNP), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/ICNP.2013.6733672.

Perino, D. and Varvello, M. 2011. A reality check for content centric networking. Proceedings of the ACM SIGCOMM workshop on information-centric networking, ACM, 44–49. https://doi.org/10.1145/2018584.2018596.

Pesavento, D., Grassi, G., Palazzi, C.E., and Pau, G. 2013. A naming scheme to represent geographic areas in NDN. 2013 IFIP wireless days (WD), ieeexplore.ieee.org, 1–3. https://doi.org/10.1109/WD.2013.6686541.

Piro, G., Ciancaglini, V., Loti, R., Grieco, L.A., and Liquori, L. 2015. Providing Crowd-Sourced and Real-Time media services through an NDN-Based platform. In: Modeling and processing for Next-Generation Big-Data technologies. Springer, Cham, 405–441. https://doi.org/10.1007/978-3-319-09177-8\_17.

Posch, D., Kreuzberger, C., Rainer, B., and Hellwagner, H. 2014. Client starvation: A shortcoming of client-driven adaptive streaming in named data networking. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 183–184. https://doi.org/10.1145/2660129.2660162.

Posch, D., Rainer, B., and Hellwagner, H. 2017a. Towards a Context-Aware forwarding plane in named data networking supporting QoS. ACM SIGCOMM Computer Communication Review 47, 1, 4–14. https://doi.org/10.1145/3041027.3041029.

Posch, D., Rainer, B., and Hellwagner, H. 2017b. SAF: Stochastic adaptive forwarding in named data networking. IEEE/ACM Transactions on Networking 25, 2, 1089–1102. https://doi.org/10.1109/TNET.2016.2614710.

Qian, H., Ravindran, R., Wang, G.Q., and Medhi, D. 2013. Probability-based adaptive forwarding strategy in named data networking. 2013 IFIP/IEEE international symposium on integrated network management (IM 2013), ieeexplore.ieee.org, 1094–1101.

Qiao, X., Nan, G., Peng, Y., Guo, L., Chen, J., Sun, Y., and Chen, J. 2015. NDNBrowser: An extended web browser for named data networking. Journal of Network and Computer Applications 50, 134–147. https://doi.org/10.1016/j.jnca.2014.06.009.

Quan, W., Xu, C., Guan, J., Zhang, H., and Grieco, L.A. 2014. Scalable name lookup with adaptive prefix bloom filter for named data networking. IEEE Communications Letters 18, 1, 102–105. https://doi.org/10.1109/LCOMM.2013.112413.132231.

Quevedo, J., Antunes, M., Corujo, D., Gomes, D., and Aguiar, R.L. 2016. On the application of contextual IoT service discovery in information centric networks. Computer communications 89-90, 117–127. https://doi.org/10.1016/j.comcom.2016.03.011.

Rainer, B., Posch, D., and Hellwagner, H. 2016. Investigating the performance of Pull-Based dynamic adaptive streaming in NDN. IEEE Journal on Selected Areas in Communications 34, 8, 2130–2140. https://doi.org/10.1109/JSAC.2016.2577365.

Ran, J., Lv, N., Zhang, D., Ma, Y., and Xie, Z. 2013. On performance of cache policies in named data networking. International conference on advanced computer science and electronics information, atlantis-press.com, 668–671.

Rao, Y., Gao, D., and Luo, H. 2014a. NLBA: A novel provider mobility support approach in mobile NDN environment. 2014 IEEE 11th consumer communications and networking conference (CCNC), ieeexplore.ieee.org, 188–193. https://doi.org/10.1109/CCNC.2014.6866569.

Rao, Y., Luo, H., Gao, D., Zhou, H., and Zhang, H. 2014b. LBMA: A novel locator based mobility support approach in named data networking. China Communications 11, 4, 111–120. https://doi.org/10.1109/CC.2014.6827573.

Rao, Y., Zhou, H., Gao, D., Luo, H., and Liu, Y. 2013. Proactive caching for enhancing User-Side mobility support in named data networking. 2013 seventh international conference on innovative mobile and internet services in ubiquitous computing, ieeexplore.ieee.org, 37–42. https://doi.org/10.1109/IMIS.2013.16.

Ravindran, R., Lo, S., Zhang, X., and Wang, G. 2012. Supporting seamless mobility in named data networking. 2012 IEEE international conference on communications (ICC), ieeexplore.ieee.org, 5854–5869. https://doi.org/10.1109/ICC.2012.6364701.

Reardon, R.D., Karmasin, B.M., Prieto, L.M., Hurley, W.J., and VonMutius, J. 2003. A SIDE-BY-SIDE COMPARISON OF STEP FEED BNR AND SIMULTANEOUS NDN. Proceedings of the Water Environment Federation 7, 563–584. https://doi.org/10.2175/193864703784640866.

Refaei, M.T., Ha, S., Cavallero, Z., and Hager, C. 2016. Named data networking for tactical communication environments. 2016 IEEE 15th international symposium on network computing and applications (NCA), 118–121. https://doi.org/10.1109/NCA.2016.7778604.

Rehman, R.A., Kim, J., and Kim, B.-S. 2015. NDN-CRAHNs: Named data networking for cognitive radio ad hoc networks. Mobile Information Systems 2015. https://doi.org/10.1155/2015/281893.

Ren, Y., Li, J., Shi, S., Li, L., and Chang, X. 2015. An interest control protocol for named data networking based on explicit feedback. Proceedings of the eleventh ACM/IEEE symposium on architectures for networking and communications systems, IEEE Computer Society, 199–200.

Ren, Y., Li, J., Shi, S., Li, L., and Wang, G. 2016a. An explicit congestion control algorithm for named data networking. 2016 IEEE conference on computer communications workshops (INFOCOM WKSHPS), 294–299. https://doi.org/10.1109/INFCOMW.2016.7562089.

Ren, Y., Li, J., Shi, S., Li, L., Wang, G., and Zhang, B. 2016b. Congestion control in named data networking–a survey. Computer communications 86, 1–11.

Ren, Y., Li, J., Shi, S., Li, L., Wang, G., and Zhang, B. 2016c. Congestion control in named data networking – a survey. Computer communications 86, 1–11. https://doi.org/10.1016/j.comcom.2016.04.017.

Rezaeifar, Z., Wang, J., and Oh, H. 2018. A trust-based method for mitigating cache poisoning in name data networking. Journal of Network and Computer Applications 104, 117–132. https://doi.org/10.1016/j.jnca.2017.12.013.

Rezazad, M. and Tay, Y.C. 2013. A cache miss equation for partitioning an NDN content store. Proceedings of the 9th asian internet engineering conference, ACM, 1–8. https://doi.org/10.1145/2534142.2534143.

Rezazad, M. and Tay, Y.C. 2015. CCndnS: A strategy for spreading content and decoupling NDN caches. 2015 IFIP networking conference (IFIP networking), ieeexplore.ieee.org, 1–9. https://doi.org/10.1109/IFIPNetworking.2015.7145295.

Rowshanrad, S., Parsaei, M.R., and Keshtgari, M. 2016. IMPLEMENTING NDN USING SDN: A REVIEW ON METHODS AND APPLICATIONS. IIUM Engineering Journal 17, 2, 11–20.

Sadiku, M.N.O., Shadare, A.E., and Musa, S.M. 2017. Named data networking. International journal of engineering research and applications 6, 7, 371–372.

Salah, H., Wulfheide, J., and Strufe, T. 2015a. Lightweight coordinated defence against interest flooding attacks in NDN. 2015 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 103–104. https://doi.org/10.1109/INFCOMW.2015.7179364.

Salah, H., Wulfheide, J., and Strufe, T. 2015b. Coordination supports security: A new defence mechanism against interest flooding in NDN. 2015 IEEE 40th conference on local computer networks (LCN), ieeexplore.ieee.org, 73–81. https://doi.org/10.1109/LCN.2015.7366285.

Saltarin, J., Bourtsoulatze, E., Thomos, N., and Braun, T. 2017. Adaptive video streaming with network coding enabled named data networking. IEEE Transactions on Multimedia 19, 10, 2182–2196. https://doi.org/10.1109/TMM.2017.2737950.

Saxena, D. and Raychoudhury, V. 2016a. Radient: Scalable, memory efficient name lookup algorithm for named data networking. Journal of Network and Computer Applications 63, 1–13. https://doi.org/10.1016/j.jnca.2015.12.009.

Saxena, D. and Raychoudhury, V. 2016b. N-FIB: Scalable, memory efficient name-based forwarding. Journal of Network and Computer Applications 76, 101–109. https://doi.org/10.1016/j.jnca.2016.09.007.

Saxena, D., Raychoudhury, V., and Becker, C. 2017. Implementation and performance evaluation of name-based forwarding schemes in V-NDN. Proceedings of the 18th international conference on distributed computing and networking, ACM, 35:1–35:4. https://doi.org/10.1145/3007748.3007766.

Saxena, D., Raychoudhury, V., Becker, C., and Suri, N. 2016a. Reliable memory efficient name forwarding in named data networking. 2016 IEEE intl conference on computational science and engineering (CSE) and IEEE intl conference on embedded and ubiquitous computing (EUC) and 15th intl symposium on distributed computing and applications for business engineering (DCABES), 48–55. https://doi.org/10.1109/CSE-EUC-DCABES.2016.160.

Saxena, D., Raychoudhury, V., Suri, N., Becker, C., and Cao, J. 2016b. Named data networking: A survey. Computer Science Review 19, 15–55. https://doi.org/10.1016/j.cosrev.2016.01.001.

Schmitt, O., Majchrzak, T.A., and Bingert, S. 2015. Experimental realization of a persistent identifier infrastructure stack for named data networking. 2015 IEEE international conference on networking, architecture and storage (NAS), ieeexplore.ieee.org, 33–38. https://doi.org/10.1109/NAS.2015.7255207.

Schneider, K.M. and Krieger, U.R. 2015. Beyond network selection: Exploiting access network heterogeneity with named data networking. Proceedings of the 2Nd ACM conference on Information-Centric networking, ACM, 137–146. https://doi.org/10.1145/2810156.2810164.

Schneider, K., Yi, C., Zhang, B., and Zhang, L. 2016. A practical congestion control scheme for named data networking. Proceedings of the 3rd ACM conference on Information-Centric networking, ACM, 21–30. https://doi.org/10.1145/2984356.2984369.

Shang, W., Afanasyev, A., and Zhang, L. 2016a. The design and implementation of the NDN protocol stack for RIOT-OS. 2016 IEEE globecom workshops (GC wkshps), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/GLOCOMW.2016.7849061.

Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., Thompson, J., Burke, J., Zhang, B., and Zhang, L. 2016b. Named data networking of things. Internet-of-Things design and implementation (IoTDI), 2016 IEEE first international conference on, IEEE; ieeexplore.ieee.org, 117–128.

Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., Thompson, J., Burke, J., Zhang, B., and Zhang, L. 2016c. Named data networking of things (invited paper). 2016 IEEE first international conference on Internet-of-Things design and implementation (IoTDI), 117–128. https://doi.org/10.1109/IoTDI.2015.44.

Shang, W., Ding, Q., Marianantoni, A., Burke, J., and Zhang, L. 2014a. Securing building management systems using named data networking. IEEE network 28, 3, 50–56. https://doi.org/10.1109/MNET.2014.6843232.

Shang, W., Thompson, J., Burke, J., and Zhang, L. 2013a. Development and experimentation with ndn-js, a javascript library for named data networking. University of California, Los Angeles, Tech. Rep. NDN-0014, Revision 1.

Shang, W., Thompson, J., Cherkaoui, M., Burkey, J., and Zhang, L. 2013b. NDN.JS: A javascript client library for named data networking. 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 399–404. https://doi.org/10.1109/INFCOMW.2013.6970726.

Shang, W., Wen, Z., Ding, Q., Afanasyev, A., and Zhang, L. 2014b. Ndnfs: An ndn-friendly file system. NDN Technical Report NDN-0027, Revision 1.

Shang, W., Yu, Y., Liang, T., Zhang, B., and Zhang, L. 2015. NDN-ACE: Access control for constrained environments over named data networking. NDN Project, Tech. Rep. NDN-0036.

Shannigrahi, S., Papadopoulos, C., Yeh, E., Newman, H., Barczyk, A.J., Liu, R., Sim, A., Mughal, A., Monga, I., Vlimant, J.-R., and Wu, J. 2015. Named data networking in climate research and HEP applications. Journal of physics. Conference series 664, 5, 052033. https://doi.org/10.1088/1742-6596/664/5/052033.

Shao, Y., Tan, X., and Wu, X. 2016. Dynamic adaptive streaming in named data networking. 2016 35th chinese control conference (CCC), 6855–6860. https://doi.org/10.1109/ChiCC.2016.7554436.

Shariat, Z., Movaghar, A., and Hoseinzadeh, M. 2017. A learning automata and clustering-based routing protocol for named data networking. Telecommunication Systems 65, 1, 9–29. https://doi.org/10.1007/s11235-016-0209-8.

Shi, J., Liang, T., Wu, H., Liu, B., and Zhang, B. 2016a. NDN-NIC: Name-based filtering on network interface card. Proceedings of the 3rd ACM conference on Information-Centric networking, ACM, 40–49. https://doi.org/10.1145/2984356.2984358.

Shi, J., Piao, X., Li, L., Xun, Y., and Lei, K. 2016b. A Peer-to-Peer file sharing system over named data networking. 2016 IEEE 22nd international conference on parallel and distributed systems (ICPADS), 159–167. https://doi.org/10.1109/ICPADS.2016.0030.

Shi, J., Piao, X., Li, L., Xun, Y., and Lei, K. A Peer-to-Peer file sharing system over named data networking. https://doi.org/10.1109/ICPADS.2016.28.

Shi, W. and Afanasyev, A. 2015. RepoSync: Combined action-based and data-based synchronization model in named data network. 2015 IEEE conference on computer communications workshops (INFOCOM WKSHPS), 275–280. https://doi.org/10.1109/INFCOMW.2015.7179397.

Shilton, K. 2013. Social values in a future internet: Analyzing the named data networking protocols..

Shilton, K., Burke, J., Duan, C., Zhang, L., and Others. 2014. A world on NDN: Affordances & implications of the named data networking future internet architecture. NDN, Technical Report NDN-0018.

Silva, R.S. da and Zorzo, S.D. 2015. An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. 2015 12th annual IEEE consumer communications and networking conference (CCNC), ieeexplore.ieee.org, 128–133. https://doi.org/10.1109/CCNC.2015.7157958.

Situmorang, H., Syambas, N.R., and Juhana, T. 2016. The effect of scaling the size of topology and content stored on the named data networking. 2016 10th international conference on telecommunication systems services and applications (TSSA), 1–6. https://doi.org/10.1109/TSSA.2016.7871110.

So, W., Chung, T., Yuan, H., Oran, D., and Stapp, M. 2014. Toward terabyte-scale caching with SSD in a named data networking router. 2014 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), ieeexplore.ieee.org, 241–242.

So, W., Narayanan, A., and Oran, D. 2013a. Named data networking on a router: Fast and dos-resistant forwarding with hash tables. Proceedings of the ninth ACM/IEEE symposium on architectures for networking and communications systems, IEEE Press, 215–226.

So, W., Narayanan, A., Oran, D., and Stapp, M. 2013b. Named data networking on a router: Forwarding at 20Gbps and beyond. Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, ACM, 495–496. https://doi.org/10.1145/2486001.2491699.

Song, Y., Liu, M., and Wang, Y. 2011. Power-Aware traffic engineering with named data networking. 2011 seventh international conference on mobile ad-hoc and sensor networks, ieeexplore.ieee.org, 289–296. https://doi.org/10.1109/MSN.2011.64.

Sourlas, V., Flegkas, P., and Tassiulas, L. 2013. Cache-aware routing in Information-Centric networks. 2013 IFIP/IEEE international symposium on integrated network management (IM 2013), ieeexplore.ieee.org, 582–588.

Stanik, J. 2009. A conversation with van jacobson. Queueing Systems. Theory and Applications 7, 1, 9. https://doi.org/10.1145/1508211.1508215.

Tan, X., Zhao, Z., Cheng, Y., and Su, J. 2016. Flow-based NDN architecture. 2016 IEEE international conference on communications (ICC), ieeexplore.ieee.org, 1–6. https://doi.org/10.1109/ICC.2016.7511369.

Tan, Y. and Zhu, S. 2015. Efficient name lookup scheme based on hash and character trie in named data networking. 2015 12th web information system and application conference (WISA), 130–135. https://doi.org/10.1109/WISA.2015.72.

Tanaka, D. and Kawarasaki, M. 2016. Congestion control in named data networking. 2016 IEEE international symposium on local and metropolitan area networks (LANMAN), 1–6. https://doi.org/10.1109/LANMAN.2016.7548848.

Tang, J., Zhang, Z., Liu, Y., and Zhang, H. 2013. Identifying interest flooding in named data networking. 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, ieeexplore.ieee.org, 306–310. https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.68.

Taniguchi, K., Takemasa, J., Koizumi, Y., and Hasegawa, T. 2016. A method for designing high-speed software NDN routers. Proceedings of the 3rd ACM conference on Information-Centric networking, ACM, 203–204. https://doi.org/10.1145/2984356.2985234.

Thompson, J. and Burke, J. 2014. NDN common client libraries. Technical Report NDN-0024, Revision 1. NDN Project.

Torres, J. and Duarte, O. 2015. CRoS-NDN: Controller-based routing strategy for named data networking. http://www.gta.ufrj.br/ftp/gta/TechReports/ToDu14a.pdf.

Torres, J., Ferraz, L., and Duarte, O. 2012. Controller-based routing scheme for named data network. Electrical Engineering Program, COPPE/UFRJ, Tech: Rep.

Torres, J.V., Alvarenga, I.D., Boutaba, R., and Duarte, O.C.M.B. 2017. An autonomous and efficient controller-based routing scheme for networking Named-Data mobility. Computer communications 103, 94–103. https://doi.org/10.1016/j.comcom.2017.02.001.

Tortelli, M., Grieco, L.A., and Boggia, G. 2013. Performance assessment of routing strategies in named data networking. IEEE ICNP, pdfs.semanticscholar.org.

Tortelli, M., Piro, G., Grieco, L.A., and Boggia, G. 2015. On simulating bloom filters in the ndnSIM open source simulator. Simulation Modelling Practice and Theory 52, 149–163. https://doi.org/10.1016/j.simpat.2015.01.006.

Tortelli, M., Rossi, D., Boggia, G., and Grieco, L.A. 2016. ICN software tools: Survey and cross-comparison. Simulation Modelling Practice and Theory 63, 23–46. https://doi.org/10.1016/j.simpat.2016.01.015.

Tsudik, G., Uzun, E., and Wood, C.A. 2016. AC3N: Anonymous communication in Content-Centric networking. 2016 13th IEEE annual consumer communications networking conference (CCNC), ieeexplore.ieee.org, 988–991. https://doi.org/10.1109/CCNC.2016.7444924.

Uzun, E., DiBenedetto, S., Tsudik, G., and Gasti, P. 2011. Anonymous named data networking application. CCNxCon, CCN community meeting, sprout.ics.uci.edu.

Wang, J., Peng, C., Li, C., Osterweil, E., Wakikawa, R., Cheng, P.-C., and Zhang, L. 2010a. Implementing instant messaging using named data. Proceedings of the sixth asian internet engineering conference, ACM, 40–47. https://doi.org/10.1145/1930286.1930292.

Wang, J., Wakikawa, R., and Zhang, L. 2010b. DMND: Collecting data from mobiles using named data. 2010 IEEE vehicular networking conference, ieeexplore.ieee.org, 49–56. https://doi.org/10.1109/VNC.2010.5698270.

Wang, K., Chen, J., Zhou, H., Qin, Y., and Zhang, H. 2014a. Modeling denial-of-service against pending interest table in named data networking. International Journal of Communication Systems 27, 12, 4355–4368.

Wang, K., Zhou, H., Qin, Y., and Zhang, H. 2014b. Cooperative-Filter: Countering interest flooding attacks in named data networking. Soft Computing 18, 9, 1803–1813. https://doi.org/10.1007/s00500-014-1275-z.

Wang, L., Afanasyev, A., Kuntz, R., Vuyyuru, R., Wakikawa, R., and Zhang, L. 2012a. Rapid traffic information dissemination using named data. Proceedings of the 1st ACM workshop on emerging Name-Oriented mobile networking design - architecture, algorithms, and applications, ACM, 7–12. https://doi.org/10.1145/2248361.2248365.

Wang, L., Hoque, A., Yi, C., Alyyan, A., and Zhang, B. 2012b. OSPFN: An OSPF based routing protocol for named data networking. University of Memphis and University of Arizona, Tech. Rep.

Wang, L., Li, R., and Cui, B. 2017. ROI-Based forwarding strategy for named data delay tolerant networking. 2017 ninth international conference on ubiquitous and future networks (ICUFN), 81–86. https://doi.org/10.1109/ICUFN.2017.7993752.

Wang, L., Moiseenko, I., and Wang, D. 2016a. When video streaming meets named data networking: A case study. 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), 166–173. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0034.

Wang, L., Moiseenko, I., and Zhang, L. 2015. NDNlive and NDNtube: Live and prerecorded video streaming over NDN. Tech. Rep. NDN-0031.

Wang, L., Shang, W., He, W., and Wang, D. 2016b. Consistent replication protocol for named data networking. 2016 IEEE 24th international conference on network protocols (ICNP), 1–2. https://doi.org/10.1109/ICNP.2016.7784456.

Wang, Y., Dai, H., Jiang, J., He, K., Meng, W., and Liu, B. 2011. Parallel name lookup for named data networking. 2011 IEEE global telecommunications conference - GLOBECOM 2011, ieeexplore.ieee.org, 1–5. https://doi.org/10.1109/GLOCOM.2011.6134161.

Wang, Y., Dai, H., Zhang, T., Meng, W., Fan, J., and Liu, B. 2013a. GPU-accelerated name lookup with component encoding. Computer Networks 57, 16, 3165–3177. https://doi.org/10.1016/j.comnet.2013.07.006.

Wang, Y., He, K., Dai, H., Meng, W., Jiang, J., Liu, B., and Chen, Y. 2012c. Scalable name lookup in NDN using effective name component encoding. 2012 IEEE 32nd international conference on distributed computing systems, ieeexplore.ieee.org, 688–697. https://doi.org/10.1109/ICDCS.2012.35.

Wang, Y., Liu, H., Huang, L., and Stankovic, J. 2016c. Efficient and proactive V2V information diffusion using named data networking. 2016 IEEE/ACM 24th international symposium on quality of service (IWQoS), 1–10. https://doi.org/10.1109/IWQoS.2016.7590391.

Wang, Y., Rozhnova, N., Narayanan, A., Oran, D., and Rhee, I. 2013b. An improved hop-by-hop interest shaper for congestion control in named data networking. Proceedings of the 3rd ACM SIGCOMM workshop on information-centric networking, ACM, 55–60. https://doi.org/10.1145/2491224.2491233.

Wang, Y., Tai, D., Zhang, T., Lu, J., Xu, B., Dai, H., and Liu, B. 2013c. Greedy name lookup for named data networking. SIGMETRICS Perform. Eval. Rev. 41, 1, 359–360. https://doi.org/10.1145/2494232.2465741.

Wang, Y., Xu, B., Tai, D., Lu, J., Zhang, T., Dai, H., Zhang, B., and Liu, B. 2014c. Fast name lookup for named data networking. 2014 IEEE 22nd international symposium of quality of service (IWQoS), ieeexplore.ieee.org, 198–207. https://doi.org/10.1109/IWQoS.2014.6914320.

Wang, Z., Qu, Z., and Burke, J. 2014d. Demo overview-matryoshka: Design of NDN multiplayer online game. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 209–210. https://doi.org/10.1145/2660129.2660139.

Wu, D., Xu, Z., Chen, B., and Zhang, Y. 2016. What if routers are malicious? Mitigating content poisoning attack in NDN. 2016 IEEE Trustcom/BigDataSE/ISPA, ieeexplore.ieee.org, 481–488. https://doi.org/10.1109/TrustCom.2016.0100.

Wu, H., Li, J., Pan, T., and Liu, B. 2013a. A novel caching scheme for the backbone of named data networking. 2013 IEEE international conference on communications (ICC), ieeexplore.ieee.org, 3634–3638. https://doi.org/10.1109/ICC.2013.6655117.

Wu, H., Li, J., Wang, Y., and Liu, B. 2013b. EMC: The effective Multi-Path caching scheme for named data networking. 2013 22nd international conference on computer communication and networks (ICCCN), ieeexplore.ieee.org, 1–7. https://doi.org/10.1109/ICCCN.2013.6614132.

Wu, H., Shi, J., Wang, Y., Wang, Y., Zhang, G., Wang, Y., Liu, B., and Zhang, B. 2017. On incremental deployment of named data networking in local area networks. 2017 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 82–94. https://doi.org/10.1109/ANCS.2017.18.

Wu, T.-Y., Lee, W.-T., Duan, C.-Y., and Wu, Y.-W. 2014. Data lifetime enhancement for improving QoS in NDN. Procedia computer science 32, 69–76. https://doi.org/10.1016/j.procs.2014.05.399.

Xie, R., Wen, Y., Jia, X., and Xie, H. 2015. Supporting seamless virtual machine migration via named data networking in cloud data center. IEEE Transactions on Parallel and Distributed Systems 26, 12, 3485–3497. https://doi.org/10.1109/TPDS.2014.2377119.

Yan, H., Gao, D., and Su, W. 2016. A hierarchical cluster-based caching for named data networking. 2016 IEEE/CIC international conference on communications in china (ICCC), 1–6. https://doi.org/10.1109/ICCChina.2016.7636721.

Yan, H., Gao, D., Su, W., Foh, C.H., Zhang, H., and Vasilakos, A.V. 2017. Caching strategy based on hierarchical cluster for named data networking. IEEE Access 5, 8433–8443. https://doi.org/10.1109/ACCESS.2017.2694045.

Yan, Z., Zeadally, S., and Park, Y.J. 2014. A novel vehicular information network architecture based on named data networking (NDN). IEEE Internet of Things Journal 1, 6, 525–532. https://doi.org/10.1109/JIOT.2014.2354294.

Yao, J., Yin, B., and Lu, X. 2016. A novel joint adaptive forwarding and resource allocation strategy for named data networking based on SMDP. 2016 12th IEEE international conference on control and automation (ICCA), 956–961. https://doi.org/10.1109/ICCA.2016.7505403.

Yao, J., Yin, B., Tan, X., and Jiang, X. 2017. A POMDP framework for forwarding mechanism in named data networking. Computer Networks 112, 167–175. https://doi.org/10.1016/j.comnet.2016.11.005.

Yeh, E., Ho, T., Cui, Y., Burd, M., Liu, R., and Leong, D. 2014. VIP: A framework for joint dynamic forwarding and caching in named data networks. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 117–126. https://doi.org/10.1145/2660129.2660151.

Yeh, E., Ho, T., Cui, Y., Burd, M., Liu, R., and Leong, D. 2015. VIP: Joint traffic engineering and caching in named data networks. 2015 international conference on computing, networking and communications (ICNC), 695–699. https://doi.org/10.1109/ICCNC.2015.7069430.

Yeh, E., Ho, T., Cui, Y., Liu, R., Burd, M., and Leong, D. 2013. Forwarding, caching and congestion control in named data networks. arXiv preprint arXiv:1310. 5569.

Yi, C., Abraham, J., Afanasyev, A., Wang, L., Zhang, B., and Zhang, L. 2014. On the role of routing in named data networking. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 27–36. https://doi.org/10.1145/2660129.2660140.

Yi, C., Afanasyev, A., Moiseenko, I., Wang, L., Zhang, B., and Zhang, L. 2013. A case for stateful forwarding plane. Computer communications 36, 7, 779–791. https://doi.org/10.1016/j.comcom.2013.01.005.

Yi, C., Afanasyev, A., Wang, L., Zhang, B., and Zhang, L. 2012. Adaptive forwarding in named data networking. SIGCOMM Comput. Commun. Rev. 42, 3, 62–67. https://doi.org/10.1145/2317307.2317319.

Yu, W. and Pao, D. 2016. Hardware accelerator to speed up packet processing in NDN router. Computer communications 91-92, 109–119. https://doi.org/10.1016/j.comcom.2016.06.004.

Yu, Y. 2015. Public key management in named data networking. NDN, Univ. California, Los Angeles, CA, USA, Tech. Rep. NDN-0029.

Yu, Y., Afanasyev, A., Clark, D., Claffy, K., Jacobson, V., and Zhang, L. 2015. Schematizing trust in named data networking. Proceedings of the 2nd ACM conference on Information-Centric networking, ACM, 177–186. https://doi.org/10.1145/2810156.2810170.

Yu, Y., Afanasyev, A., Seedorf, J., Zhang, Z., and Zhang, L. 2017. NDN DeLorean: An authentication system for data archives in named data networking. Proceedings of the 4th ACM conference on Information-Centric networking, ACM, 11–21. https://doi.org/10.1145/3125719.3125724.

Yu, Y., Afanasyev, A., and Zhang, L. 34AD. Name-based access control. Project, Technical Report NDN-0034.

Yu, Y., Afanasyev, A., Zhu, Z., and Zhang, L. 2014. An endorsement-based key management system for decentralized NDN chat application. University of California, Los Angeles, Tech. Rep. NDN-0023.

Yu, Y.T., Dilmaghani, R.B., Calo, S., Sanadidi, M.Y., and Gerla, M. 2013. Interest propagation in named data manets. 2013 international conference on computing, networking and communications (ICNC), ieeexplore.ieee.org, 1118–1122. https://doi.org/10.1109/ICCNC.2013.6504249.

Yuan, H. and Crowley, P. 2011. Performance measurement of Name-Centric content distribution methods. Proceedings of the 2011 ACM/IEEE seventh symposium on architectures for networking and communications systems, IEEE Computer Society, 223–224. https://doi.org/10.1109/ANCS.2011.43.

Yuan, H., Crowley, P., and Song, T. 2017. Enhancing scalable Name-Based forwarding. 2017 ACM/IEEE symposium on architectures for networking and communications systems (ANCS), 60–69. https://doi.org/10.1109/ANCS.2017.16.

Yuan, H., Song, T., and Crowley, P. 2012. Scalable NDN forwarding: Concepts, issues and principles. 2012 21st international conference on computer communications and networks (ICCCN), ieeexplore.ieee.org, 1–9. https://doi.org/10.1109/ICCCN.2012.6289305.

Zalak, P., Aemi, K., Raval, G., Ukani, V., and Valiveti, S. 2017. Open issues in named data networking – a survey. Information and communication technology for intelligent systems (ICTIS 2017) - volume 1, Springer, Cham, 285–292. https://doi.org/10.1007/978-3-319-63673-3\_34.

Zeng, Y. and Hong, X. 2011. A caching strategy in mobile ad hoc named data network. 2011 6th international ICST conference on communications and networking in china (CHINACOM), ieeexplore.ieee.org, 805–809. https://doi.org/10.1109/ChinaCom.2011.6158264.

Zeynalvand, L., Gharib, M., and Movaghar, A. 2015. Decentralized social networking using Named-Data. Computer networks, Springer, Cham, 421–430. https://doi.org/10.1007/978-3-319-19419-6\_40.

Zhang, G., Qi, D., and Gao, Q. 2016a. Architectural mechanisms for anycast provision in named data networking. 2016 22nd Asia-Pacific conference on communications (APCC), 567–572. https://doi.org/10.1109/APCC.2016.7581491.

Zhang, H., Xie, R., Zhu, S., Huang, T., and Liu, Y. 2016b. DENA: An intelligent content discovery system used in named data networking. IEEE Access 4, 9093–9107. https://doi.org/10.1109/ACCESS.2016.2638474.

Zhang, L. 2011. Evolving internet into the future via named data networking. Presentation, APRICOT-APAN.

Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K., Crowley, P., Papadopoulos, C., Wang, L., and Zhang, B. 2014a. Named data networking. ACM SIGCOMM Computer Communication Review 44, 3, 66–73. https://doi.org/10.1145/2656877.2656887.

Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., Zhang, B., Tsudik, G., Massey, D., and Papadopoulos, C. 2010. Named data networking (NDN) project..

Zhang, M., Lehman, V., and Wang, L. 2016c. Partialsync: Efficient synchronization of a partial namespace in ndn. Technical report, Technical Report NDN-0039, NDN.

Zhang, M., Lehman, V., and Wang, L. 2017a. Scalable name-based data synchronization for named data networking. IEEE INFOCOM 2017 - IEEE conference on computer communications, 1–9. https://doi.org/10.1109/INFOCOM.2017.8057193.

Zhang, Y., Afanasyev, A., Burke, J., and Zhang, L. 2016d. A survey of mobility support in named data networking. 2016 IEEE conference on computer communications workshops (INFOCOM WKSHPS), ieeexplore.ieee.org, 83–88. https://doi.org/10.1109/INFCOMW.2016.7562050.

Zhang, Y., Zhang, H., and Zhang, L. 2014b. Kite: A mobility support scheme for NDN. Proceedings of the 1st ACM conference on Information-Centric networking, ACM, 179–180. https://doi.org/10.1145/2660129.2660159.

Zhang, Z., Afanasyev, A., and Zhang, L. 2017b. NDNCERT: Universal usable trust management for NDN. Proceedings of the 4th ACM conference on Information-Centric networking, ACM, 178–179. https://doi.org/10.1145/3125719.3132090.

Zhang, Z., Ma, H., Xue, Y., and Liu, L. 2017c. Fair video caching for named data networking. 2017 IEEE international conference on communications (ICC), 1–6. https://doi.org/10.1109/ICC.2017.7997024.

Zhang, Z., Yu, Y., Afanasyev, A., and Zhang, L. 2017d. NDN certificate management protocol (NDNCERT). named-data.net.

Zhou, Z., Tan, X., Li, H., Zhao, Z., and Ma, D. 2014. MobiNDN: A mobility support architecture for NDN. Proceedings of the 33rd chinese control conference, ieeexplore.ieee.org, 5515–5520. https://doi.org/10.1109/ChiCC.2014.6895882.

Zhu, Z. and Afanasyev, A. 2013. Let’s ChronoSync: Decentralized dataset state synchronization in named data networking. 2013 21st IEEE international conference on network protocols (ICNP), ieeexplore.ieee.org, 1–10. https://doi.org/10.1109/ICNP.2013.6733578.

Zhu, Z., Afanasyev, A., and Zhang, L. 2013. A new perspective on mobility support. Named-Data Networking Project, Tech. Rep.

Zhu, Z., Bian, C., Afanasyev, A., Jacobson, V., and Zhang, L. 2012. Chronos: Serverless multi-user chat over NDN. University of California, Los Angeles, Tech. Rep. NDN-0008, 1–12.

Zhu, Z., Burke, J., Zhang, L., Gasti, P., Lu, Y., and Jacobson, V. 2011a. A new approach to securing audio conference tools. Proceedings of the 7th asian internet engineering conference, ACM, 120–123. https://doi.org/10.1145/2089016.2089036.

Zhu, Z., Wang, S., Yang, X., Jacobson, V., and Zhang, L. 2011b. ACT: Audio conference tool over named data networking. Proceedings of the ACM SIGCOMM workshop on information-centric networking, ACM, 68–73. https://doi.org/10.1145/2018584.2018601.