Amanote Research
Register
Sign In
Preventing Unauthorized Access in Information Centric Networking
Security and Privacy
doi 10.1002/spy2.33
Full Text
Open PDF
Abstract
Available in
full text
Date
July 1, 2018
Authors
Eslam G. AbdAllah
Mohammad Zulkernine
Hossam S. Hassanein
Publisher
Wiley
Related search
Key Management in Information Centric Networking
International Journal of Computer Networks and Communications
Hardware
Computer Networks
Architecture
Communications
Rules Assurance: Preventing Unauthorized Access Through Building Right Firewall Configuration
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Empowering 5G Network Softwarization Through Information Centric Networking
Internet Technology Letters
Improving the Methods for Protecting Information From Unauthorized Access
NBI Technologies
Intelligent User-Centric Access to Public Information
RIOT-ROS2: Low-Cost Robots in IoT Controlled via Information-Centric Networking
Designing Time Slotted Channel Hopping and Information - Centric Networking for IoT
Information-Centric Multilayer Networking: Improving Performance Through an ICN/WDM Architecture
IEEE/ACM Transactions on Networking
Electronic Engineering
Computer Networks
Communications
Computer Science Applications
Electrical
Software
Security Monitoring for Content-Centric Networking
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science