Data authentication for NDN using hash chains

Tamer Refaei, Márk Horváth, Michelle Schumaker, Creighton Hager. Data authentication for NDN using hash chains. In 2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015. pages 982-987, IEEE Computer Society, 2015. [doi]

Abstract

Abstract is missing.