Black hole attack in mobile Ad Hoc networks, Proceedings of the 42nd annual Southeast regional conference on , ACM-SE 42, pp.96-97, 2004. ,
DOI : 10.1145/986537.986560
Security and Privacy Analysis of NSF Future Internet Architectures, 2016. ,
MAP-Me: Managing Anchor-less Producer Mobility in Information-Centric Networks. arXiv preprint, 2016. ,
A scalable mobility-centric architecture for named data networking. arXiv preprint arXiv:1406, p.7049, 2014. ,
A study of prefix hijacking and interception in the internet, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.265-276, 2007. ,
DOI : 10.1145/1282427.1282411
4G LTE security for mobile network operators, Cyber Security and Information Systems, vol.1, issue.4, pp.20-29, 2013. ,
A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE 98, pp.100-122, 2010. ,
DOI : 10.1109/JPROC.2009.2034031
Design, implementation, and evaluation of cellular IP, IEEE Personal Communications, vol.7, issue.4, pp.42-49, 2000. ,
Guide to LTE Security, DRAFT NIST Special Publication, pp.800-187, 2016. ,
DOI : 10.6028/NIST.SP.800-187
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking, Computer Networks, vol.57, issue.16, pp.3178-3191, 2013. ,
DOI : 10.1016/j.comnet.2013.07.034
Almost Optimal Hash Sequence Traversal, International Conference on Financial Cryptography, pp.102-119, 2002. ,
DOI : 10.1007/3-540-36504-4_8
URL : http://www.informatics.indiana.edu/markus/papers/AOhash.ps
TeleMIP: telecommunications-enhanced mobile IP architecture for fast intradomain mobility, IEEE Personal Communications, vol.7, issue.4, pp.50-58, 2000. ,
DOI : 10.1109/98.863996
Interest-Based Access Control for Content Centric Networks, Proceedings of the 2nd International Conference on Information-Centric Networking, ICN '15, pp.147-156, 2015. ,
DOI : 10.1109/INFCOM.2010.5462174
URL : http://arxiv.org/pdf/1505.06258
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014. ,
DOI : 10.14722/sent.2014.23014
Publisher mobility support in content centric networks, International Conference on Information Networking (ICOIN). IEEE, pp.214-219, 2014. ,
Global source mobility in the content-centric networking architecture, Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design, Architecture, Algorithms, and Applications, NoM '12, pp.13-18, 2012. ,
DOI : 10.1145/2248361.2248366
Securing BGP ??? A Literature Survey, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.199-222, 2011. ,
DOI : 10.1109/SURV.2011.041010.00041
Secure Border Gateway Protocol (S-BGP), IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.582-592, 2000. ,
DOI : 10.1109/49.839934
URL : http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/045.pdf
Mobility support in content centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, pp.13-18, 2012. ,
DOI : 10.1145/2342488.2342492
URL : http://conferences.sigcomm.org/sigcomm/2012/paper/icn/p13.pdf
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
URL : http://www.cs.utk.edu/~dunigan/cs594-cns00/lamport.pdf
Device mobility management in content-centric networking, IEEE Communications Magazine, vol.50, issue.12, pp.28-34, 2012. ,
DOI : 10.1109/MCOM.2012.6384448
SCOM: A Scalable Content Centric Network Architecture with Mobility Support, 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, pp.25-32, 2013. ,
DOI : 10.1109/MSN.2013.44
OSPF with digital signatures. RFC 2154, 1997. ,
DOI : 10.17487/rfc2154
Certificate revocation and certificate update, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.561-570, 2000. ,
DOI : 10.1109/49.839932
URL : http://www.sagecertification.org/publications/library/proceedings/sec98/full_papers/nissim/nissim.pdf
Cryptographic hash functions, European Transactions on Telecommunications, vol.3, issue.5, pp.431-448, 1994. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
On interdomain routing security and pretty secure BGP (psBGP), ACM Transactions on Information and System Security, vol.10, pp.3-11, 2007. ,
S-RIP: A Secure Distance Vector Routing Protocol, Applied Cryptography and Network Security (ACNS, pp.103-119, 2004. ,
DOI : 10.1007/978-3-540-24852-1_8
URL : http://www.scs.carleton.ca/~canccom/Publications/tao-srip.pdf
MobiCCN: Mobility support with greedy routing in Content-Centric Networks, 2013 IEEE Global Communications Conference (GLOBECOM), pp.2069-2075, 2013. ,
DOI : 10.1109/GLOCOM.2013.6831380
Securing BGP through secure origin BGP (soBGP), Business Communications Review, vol.33, issue.5, pp.47-53, 2003. ,
Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014. ,
DOI : 10.1145/2656877.2656887
URL : https://hal.archives-ouvertes.fr/hal-01182997
A survey of mobility support in Named Data Networking, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.83-88, 2016. ,
DOI : 10.1109/INFCOMW.2016.7562050
Kite, Proceedings of the 1st international conference on Information-centric networking, INC '14, pp.179-180, 2014. ,
DOI : 10.1145/2660129.2660159