Data authentication for NDN using hash chains

Tamer Refaei, Márk Horváth, Michelle Schumaker, Creighton Hager. Data authentication for NDN using hash chains. In 2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015. pages 982-987, IEEE Computer Society, 2015. [doi]

@inproceedings{RefaeiHSH15,
  title = {Data authentication for NDN using hash chains},
  author = {Tamer Refaei and Márk Horváth and Michelle Schumaker and Creighton Hager},
  year = {2015},
  doi = {10.1109/ISCC.2015.7405641},
  url = {http://dx.doi.org/10.1109/ISCC.2015.7405641},
  researchr = {https://researchr.org/publication/RefaeiHSH15},
  cites = {0},
  citedby = {0},
  pages = {982-987},
  booktitle = {2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015},
  publisher = {IEEE Computer Society},
  isbn = {978-1-4673-7194-0},
}