2Xylomenos G, Ververidis C, Siris V, et al: A survey of information-centric networking research[J] Communications Surveys & Tutorials, 2014 IEEE 16(2):1024-1049.
3J:cobson V, Smetters D K, Thornton J D, et al: Networkin[ named content[J]. Communications of the A CM, 2012, 55(1] ] 117-124.
4Lauinger T, Laoutaris N, and Rodriguez P. Privacy implications of ubiquitous caching in named data networking architectures[R1. Technical Report TR-iSecLab-0812-001, 2012.
5Lauinger T, Laoutaris N, Rodriguez P, et al: Privacy risks in named data networking: what is the cost of performance ?[J]. ACM SIGCOMM Computer Communication Review, 2012, 42(5): 54-57.
6Chaabane A, Cristofaro E D, Kaafar M A, et al: Privacy in content-oriented networking: threats and countermeasures[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33.
7Mohaisen A, Zhang X W, Schuchard M, et al: Protecting access privacy of cached contents in information centric networks[C]. Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 2013: 173-178.
8DiBenedetto S, Gasti P, Tsudik G, et al: ANDaNA: anonymous named data networking application[C].Proceedings of the Network and Distributed System SecuritySymposium, San Diego, USA, 2012: 1-18.
9Arianfar S, Koponen T, Raghavan B, et al: On preserving privacy in content-oriented networks[C]. Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Toronto, Canada, 2011: 19-24.
10Afanasyev A, Moiseenko I, and Zhang L X. ndnSIM: NDN simulator for NS-3[R]. NDN, Technical Report NDN-0005, 2012.