Author:
Affum Eric,Zhang Xiaosong,Wang Xiaofen,Obiri Isaac Amankona
Publisher
Springer International Publishing
Reference35 articles.
1. Badsha, S., Khalil, I., Yi, X., Atiquzzaman, M.: Designing privacy-preserving protocols for content sharing and aggregation in content centric networking. IEEE Access 6, 42119–42130 (2018)
2. Blaze, M., Bleumer: Divertible protocols and atomic proxy cryptography, pp. 127–144 (1998)
3. Canetti, R., Raghuraman, S., Richelson, S., Vaikuntanathan, V.: Chosen-ciphertext secure fully homomorphic encryption. In: Fehr, S. (ed.) PKC 2017. LNCS, vol. 10175, pp. 213–240. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54388-7_8
4. Carzaniga, A., Rutherford, M., Wolf, A.: A routing scheme for content-based networking. IEEE INFOCOM 2004, vol. 2, pp. 918–928 (2004)
5. Cheriton, D., Gritter, M.: Triad: a scalable deployable nat-based internet architecture, July 2000
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献