{"id":766,"date":"2012-04-29T21:27:46","date_gmt":"2012-04-29T13:27:46","guid":{"rendered":"http:\/\/www.icnalb.cn\/?p=766"},"modified":"2012-04-29T21:27:46","modified_gmt":"2012-04-29T13:27:46","slug":"on-preserving-privacy-in-information-centric-networks","status":"publish","type":"post","link":"https:\/\/www.icnlab.cn\/?p=766","title":{"rendered":"On Preserving Privacy in Information-Centric Networks"},"content":{"rendered":"<p>\u6807\u9898\uff1aOn\u00a0Preserving\u00a0Privacy\u00a0in\u00a0Information-Centric\u00a0Networks<\/p>\n<p style=\"padding-left: 30px;\">( \u6765\u6e90<span style=\"font-family: Tahoma;\">URL<\/span>\uff1a<span style=\"font-family: Tahoma;\"><a href=\"http:\/\/conferences.sigcomm.org\/sigcomm\/2011\/workshops\/ICN\/\">http:\/\/conferences.sigcomm.org\/sigcomm\/2011\/workshops\/ICN\/<\/a>\u00a0)<\/span><\/p>\n<p>\u7b80\u8981\u8bf4\u660e\uff1a<span style=\"font-family: Tahoma;\">in\u00a0ACM\u00a0SIGCOMM\u00a0workshop\u00a0on\u00a0information-centric\u00a0networking,\u00a0Toronto,\u00a0Canada,\u00a02011.<\/span><\/p>\n<p style=\"padding-left: 60px;\">( <a href=\"http:\/\/conferences.sigcomm.org\/sigcomm\/2011\/workshops.php\">http:\/\/conferences.sigcomm.org\/sigcomm\/2011\/workshops.php<\/a>\u00a0)<\/p>\n<p>\u6587\u6863\u65e5\u671f\uff1a<span style=\"font-family: Tahoma;\">2011<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5e74<\/span><span style=\"font-family: Tahoma;\">8<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u6708<\/span><span style=\"font-family: Tahoma;\">19<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u65e5\u00a0<\/span><span style=\"font-family: Tahoma;\">(August\u00a015-19,\u00a02011.)<\/span><\/p>\n<p>\u4f5c\u8005\u4fe1\u606f\uff1aSomaya\u00a0Arianfar ( <a href=\"mailto:sommaya.arianfar@ericsson.com\">sommaya.arianfar@ericsson.com<\/a> ),\u00a0Teemu\u00a0Koponen ( <a href=\"mailto:koponen@nicira.com\">koponen@nicira.com<\/a>\u00a0),\u00a0<\/p>\n<p style=\"padding-left: 60px;\">Barath\u00a0Raghavan (\u00a0<a href=\"mailto:barath@icsi.berkeley.edu\">barath@icsi.berkeley.edu<\/a> \u00a0)\u00a0and Scott\u00a0Shenker (\u00a0<a href=\"mailto:shenker@icsi.berkeley.edu\">shenker@icsi.berkeley.edu<\/a> ).<\/p>\n<p>\u9644\u4ef6\uff1a<a href=\"https:\/\/www.icnalb.cn\/wordpress\/wp-content\/uploads\/2012\/04\/On-Preserving-Privacy-in-Information-Centric-Networks-.pdf\">On Preserving Privacy in Information-Centric Networks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6807\u9898\uff1aOn\u00a0Preserving\u00a0Privacy\u00a0in\u00a0Information-Centric\u00a0Network [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/766"}],"collection":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=766"}],"version-history":[{"count":1,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/766\/revisions"}],"predecessor-version":[{"id":783,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/766\/revisions\/783"}],"wp:attachment":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}