Results 1 to 10 of about 3,222 (144)

VAL—Vehicular Adaptation Layer, for NDN

open access: yesIEEE Access, 2023
High mobility and intermittent connectivity of nodes are the main characteristics of Vehicular Ad-Hoc Networks (VANETs). These two aspects cause problems in traditional IP networking.
Joao F. Pereira   +2 more
doaj   +3 more sources

Security verification framework for NDN access control [PDF]

open access: yesScientific Reports
Named Data Networking (NDN) presents a promising alternative to TCP/IP, but its access control design poses challenges for cybersecurity. Addressing this, the paper introduces the Security Verification Framework for NDN Access Control (SVF-NDN).
Yuan Fei, Jiaqi Yin, Lijun Yan
doaj   +2 more sources

Comparison of the safety profiles for pirfenidone and nintedanib: a disproportionality analysis of the US food and drug administration adverse event reporting system [PDF]

open access: yesFrontiers in Pharmacology
BackgroundIdiopathic pulmonary fibrosis (IPF) is a chronic, progressive interstitial lung disease of unknown etiology. Pirfenidone (PFD) and nintedanib (NDN) were both conditionally recommended in the clinical practice guideline published in 2015. Safety
Xiangyu Sun   +7 more
doaj   +2 more sources

NDN-MPS [PDF]

open access: yesProceedings of the 8th ACM Conference on Information-Centric Networking, 2021
Modern digitally controlled systems require multiparty authentication to meet the security requirements. This paper describes the design and development of NDN-MPS, an automated solution to support multiparty signing and verification for NDN-enabled applications. NDN-MPS proposes three basic changes to the existing NDN security solutions.
Zhiyi Zhang   +3 more
openaire   +1 more source

Named Data Networking: A Survey on Routing Strategies

open access: yesIEEE Access, 2022
As the Internet grows in popularity, data become an increasingly crucial component. People now care more about the data than the data location. Named data network (NDN) takes this concept and pairs it with the idea of making data a core component rather ...
Farhan Ahmed Karim   +4 more
doaj   +1 more source

The Emerging of Named Data Networking: Architecture, Application, and Technology

open access: yesIEEE Access, 2023
Named Data Networking (NDN) is developed to accommodate future-oriented internet traffic. In recent years, NDN’s popularity has grown due to the evolution of the Internet of Things, Artificial Intelligence, Cloud Services, and Blockchain.
Wan Muhammad Hazwan Azamuddin   +4 more
doaj   +1 more source

NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data Networking

open access: yesFuture Internet, 2023
Named Data Networking (NDN) is an implementation of Information-Centric Networking (ICN) that has emerged as a promising candidate for the Future Internet Architecture (FIA).
Ahmed Benmoussa   +3 more
doaj   +1 more source

Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2020
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol ...
Thongchai Chuachan   +2 more
doaj   +1 more source

An efficient and DoS-resilient name lookup for NDN interest forwarding

open access: yesConnection Science, 2021
As a novel Internet architecture focused on data contents, Named Data Networking (NDN) has been proven to be of great value in supporting the Internet of Things, Edge computing, Blockchain, and other popular topics.
Dacheng He   +4 more
doaj   +1 more source

NDN-ABS [PDF]

open access: yesProceedings of the 6th ACM Conference on Information-Centric Networking, 2019
The Named Data Networking architecture mandates cryptographic signatures of packets at the network layer. Traditional RSA and ECDSA public key signatures require obtaining signer's NDN certificate (and, if needed, the next-level certificates of the trust chain) to validate the signatures. This potentially creates two problems.
Sanjeev Kaushik Ramani   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy