[Ndn-interest] NACKs in ICN

Mark Stapp mjs at cisco.com
Tue Mar 10 07:15:41 PDT 2015


Thanks for sending this around, Cesar. It's certainly good to see some 
details confirming the intuition that it would be costly for producers 
to try to use public-key operations on adversary-selected inputs as a 
means of denial-of-existence. but ... the paper doesn't explore many 
alternative schemes - we presented five, I think, at the last icnrg 
meeting. the conclusion of the paper - that NACKs have security problems 
- seems a little strong, based on the small number of approaches 
considered.

It would be very interesting to see whether your analytical tools might 
be able to be applied to some of the other approaches.

Thanks,
Mark

On 3/9/15 9:14 PM, Cesar Ghali wrote:
> Hi all,
>
> Some of you might be interested in the following report:
>
> A. Compagno, M. Conti, C. Ghali, G. Tsudik,
> To NACK or not to NACK? Negative Acknowledgments in Information-Centric
> Networking,
> arXiv: 1503.02123, March 7, 2015.
> URL: http://arxiv.org/pdf/1503.02123v1.pdf
>
> Of course, comments are appreciated.
>
> Thanks,
> Cesar
>
> --
> PGP Key: http://www.cesarghali.info/contact.html
> PGP Key ID: 0x455D8052
>
>
>
> _______________________________________________
> Ndn-interest mailing list
> Ndn-interest at lists.cs.ucla.edu
> http://www.lists.cs.ucla.edu/mailman/listinfo/ndn-interest
>



More information about the Ndn-interest mailing list