Tamer Refaei, Márk Horváth, Michelle Schumaker, Creighton Hager. Data authentication for NDN using hash chains. In 2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015. pages 982-987, IEEE Computer Society, 2015. [doi]
@inproceedings{RefaeiHSH15, title = {Data authentication for NDN using hash chains}, author = {Tamer Refaei and Márk Horváth and Michelle Schumaker and Creighton Hager}, year = {2015}, doi = {10.1109/ISCC.2015.7405641}, url = {http://dx.doi.org/10.1109/ISCC.2015.7405641}, researchr = {https://researchr.org/publication/RefaeiHSH15}, cites = {0}, citedby = {0}, pages = {982-987}, booktitle = {2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015}, publisher = {IEEE Computer Society}, isbn = {978-1-4673-7194-0}, }