SECURE CONTENT SHARING USING CONTENT CENTRIC APPROACH
摘要:
A network enabled computer system includes a processor and a dual stack communication module to couple to a network. The dual stack communication module includes information centric network layers and a secure network connection layer, each coupled to an IP connection layer to couple to a network. A storage device is coupled to the processor to cause the processor to execute operations to route IP packets. The operations include establishing a secure connection using the secure connection layer, performing authentication via the secure connection using the secure connection layer, exchanging an encryption key via the secure connection using the secure connection layer, and transferring encrypted chunks of data using information centric network IP-content packets via the information centric network layers.
信息查询
0/0