Data authentication for NDN using hash chains

Tamer Refaei, Márk Horváth, Michelle Schumaker, Creighton Hager. Data authentication for NDN using hash chains. In 2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015. pages 982-987, IEEE Computer Society, 2015. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.