Abstract is missing.
- Secure Scuttlebutt: An Identity-Centric Protocol for Subjective and Decentralized ApplicationsDominic Tarr, Erick Lavoie, Aljoscha Meyer, Christian Tschudin. 1-11 [doi]
- Inter-Server Game State Synchronization using Named Data NetworkingPhilipp Moll, Sebastian Theuermann, Natascha Rauscher, Hermann Hellwagner, Jeff Burke. 12-18 [doi]
- Decentralized and Secure Multimedia Sharing Application over Named Data NetworkingAshlesh Gawande, Jeremy Clark, Damian Coomes, Lan Wang. 19-29 [doi]
- NDN-CNL: A Hierarchical Namespace API for Named Data NetworkingJeff Thompson, Peter Gusev, Jeff Burke. 30-36 [doi]
- The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpPouyan Fotouhi Tehrani, Eric Osterweil, Jochen H. Schiller, Thomas C. Schmidt, Matthias Wählisch. 37-43 [doi]
- Name Space Analysis: Verification of Named Data Network Data PlanesMohammad Jahanian, K. K. Ramakrishnan. 44-54 [doi]
- Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN ArchitectureGiovanna Carofiglio, Luca Muscariello, Jordan Augé, Michele Papalini, Mauro Sardara, Alberto Compagno. 55-66 [doi]
- Compute First Networking: Distributed Computing meets ICNMichal Król, Spyridon Mastorakis, David Oran, Dirk Kutscher. 67-77 [doi]
- Towards Peer-to-Peer Content Retrieval Markets: Enhancing IPFS with ICNOnur Ascigil, Sergi Reñé, Michal Król, George Pavlou, Lixia Zhang 0001, Toru Hasegawa, Yuki Koizumi, Kentaro Kita. 78-88 [doi]
- On the Power of In-Network Caching in the Hadoop Distributed File SystemEric Newberry, Beichuan Zhang. 89-99 [doi]
- Easy as ABC: A Lightweight Centrality-Based Caching Strategy for Information-Centric IoTJakob Pfender, Alvin C. Valera, Winston K. G. Seah. 100-111 [doi]
- Lessons Learned Building a Secure Network Measurement Framework using Basic NDNKathleen Nichols. 112-122 [doi]
- NDN-ABS: Attribute-Based Signature Scheme for Named Data NetworkingSanjeev Kaushik Ramani, Reza Tourani, George Torres, Satyajayant Misra, Alexander Afanasyev. 123-133 [doi]
- Bluetooth Mesh under the Microscope: How much ICN is Inside?Hauke Petersen, Peter Kietzmann, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch. 134-140 [doi]
- Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN NetworksCenk Gündogan, Jakob Pfender, Michael Frey, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch. 141-152 [doi]
- Smart Forwarding in NDN VANETMuktadir Chowdhury, Junaid Ahmed Khan, Lan Wang. 153-154 [doi]
- An Optimized Congestion Control Scheme for Mice Flows in Named Data NetworkingShanshan Shi, Jun Li 0002, Haibo Wu. 155-156 [doi]
- Let Once-Request Data Go: An Online Learning Approach for ICN CachingYating Yang, Tian Song. 157-158 [doi]
- An Efficient Opportunistic Routing Protocol for ICNMin Wook Kang, Dong Yeong Seo, Yun Won Chung. 159-160 [doi]
- Sensing Content Correlation-aware In-network Caching Scheme at the Edge for Internet of ThingsNgoc-Thanh Dinh, Nhu-Ngoc Dao, Younghan Kim. 161-162 [doi]
- A Compact NDN Architecture for Cluster based Information Centric Wireless Sensor NetworksMuhammad Atif Ur Rehman, Rehmat Ullah, Byung-Seo Kim. 163-164 [doi]
- ndnShare: File Sharing Application Based on NFD-AndroidTieying Zhu, Haonan Yan, Liu Yang, Riming Zhang. 165-166 [doi]
- Canary: a Scalable Content Integrity Verifying Protocol for ICNYong-Yoon Shin, Sae Hyong Park, Quang Tung Thai, Sung Hyuk Byun. 167-168 [doi]
- Multiple Network Function Execution in ICN-based Crowdsensing Service: DemoYoji Yamamoto, Yuki Koizumi, Toru Hasegawa, Giulio Rossi, Andrea Detti, Onur Ascigil, Ioannis Psaras. 169-170 [doi]
- NDNSSEC: Namespace Management in NDN with DNSSECPouyan Fotouhi Tehrani, Luca Keidel, Eric Osterweil, Jochen H. Schiller, Thomas C. Schmidt, Matthias Wählisch. 171-172 [doi]
- Your Message Rescues Me: Enhancing NDN Communication Quality in Disaster ScenariosCenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch. 173-174 [doi]
- NDN meets BLE: A Transparent Gateway for Opening NDN-over-BLE Networks to your SmartphoneHauke Petersen, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch. 175-176 [doi]