![Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption](https://www.pdfsearch.io/img/0e84c703727ec46d96e68ac5d5f5e36a.jpg) Date: 2015-10-03 12:09:18Security Cryptography Prevention Identity management Public-key cryptography Computer networking Content centric networking Access control IBAC Encryption | | Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine Add to Reading ListSource URL: conferences2.sigcomm.orgDownload Document from Source Website File Size: 3,48 MBShare Document on Facebook
|