<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.li-icnrg-km-reqs" target="https://datatracker.ietf.org/doc/html/draft-li-icnrg-km-reqs-00">
   <front>
      <title>Requirements for Key Management Schemes in Content-Centric Networking/ Named Data Networking</title>
      <author initials="R." surname="Li" fullname="Ruidong Li">
         <organization>NICT</organization>
      </author>
      <author initials="H." surname="Asaeda" fullname="Hitoshi Asaeda">
         <organization>NICT</organization>
      </author>
      <date month="March" day="5" year="2018" />
      <abstract>
	 <t>   Signature is adopted as the fundamental function in Content-Centric
   Networking (CCN) / Named Data Networking (NDN).  Its service and
   performance rely heavily on the key management (KM) schemes, which
   are the processes to generate, deliver, store, protect, update, and
   revoke cryptographic keys.  This document describes the use scenarios
   and further requirements for KM schemes in CCN/NDN.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-li-icnrg-km-reqs-00" />
   
</reference>
