@techreport{li-icnrg-km-reqs-00, number = {draft-li-icnrg-km-reqs-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-li-icnrg-km-reqs/00/}, author = {Ruidong Li and Hitoshi Asaeda}, title = {{Requirements for Key Management Schemes in Content-Centric Networking/ Named Data Networking}}, pagetotal = 13, year = 2018, month = mar, day = 5, abstract = {Signature is adopted as the fundamental function in Content-Centric Networking (CCN) / Named Data Networking (NDN). Its service and performance rely heavily on the key management (KM) schemes, which are the processes to generate, deliver, store, protect, update, and revoke cryptographic keys. This document describes the use scenarios and further requirements for KM schemes in CCN/NDN.}, }