1. Nikos, F., Giannis, F., George, C.: Access control enforcement delegation for information-centric networking architectures. In: Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking, Helsinki, Finland, pp. 85–90 (2012)
2. Kutscher, D.: It’s the network: towards better security and transport performance in 5G. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, USA, pp. 656–661 (2016)
3. Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–36 (2012)
4. Corella, F.: User authentication with privacy and security. Unfunded Proposal to the NSF Secure and Trustworthy Cyberspace (SaTC) Program (2012)
5. Li, H., Wang, K., Miyazaki, T., Xu, C., Guo, S., Sun, Y.: Trust-enhanced content delivery in blockchain-based information-centric networking. IEEE Netw. 33(5), 183–189 (2019)