1. D. Kutscher, S. Eum, K. Pentikousis, I. Psaras, D. Corujo, D. Saucez, T. Schmidt, T. Waehlisch, Icn research challenges, 2015,.https://tools.ietf.org/html/draft-irtf-icnrg-challenges-01.
2. A survey of security attacks in information-centric networking;AbdAllah;Commun. Surv. Tutorials, IEEE,2015
3. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile, 2008, RFC 5280.
4. M. Myers, R. Ankney, M. A., S. Galperin, C. Adams, X.509 internet public key infrastructure,online certificate status protocol - ocsp, 1999. RFC 2560.
5. Perspectives: Improving ssh-style host authentication with multi-path probing;Wendlandt,2008