메뉴 건너뛰기




Volumn 21, Issue 3, 1998, Pages 203-210

Efficient security mechanisms for the border gateway routing protocol

Author keywords

BGP; Border gateway routing protocol; Path finding routing protocol; Routing protocol security

Indexed keywords

GATEWAYS (COMPUTER NETWORKS); NETWORK PROTOCOLS;

EID: 0032026162     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/s0140-3664(97)00186-2     Document Type: Article
Times cited : (18)

References (26)
  • 8
    • 0003804730 scopus 로고
    • Technical Report 117, AT and T Bell Laboratories, Murray Hill, New Jersey 07974, Feb.
    • R.T. Morris, A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report 117, AT and T Bell Laboratories, Murray Hill, New Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/cstr/117.ps.Z.
    • (1985) A Weakness in the 4.2BSD Unix TCP/IP Software
    • Morris, R.T.1
  • 10
    • 0042799568 scopus 로고
    • Comments on 'security problems in the TCP/IP protocol suite'
    • S. Kent, Comments on 'security problems in the TCP/IP protocol suite', ACM Computer Commun. Review 19 (3) (1989) 10-19.
    • (1989) ACM Computer Commun. Review , vol.19 , Issue.3 , pp. 10-19
    • Kent, S.1
  • 12
    • 0020762394 scopus 로고
    • Security mechanisms in high level network protocols
    • V.L. Voydock, S.T. Kent, Security mechanisms in high level network protocols, ACM Computing Surveys 15 (2) (1983) 135-171.
    • (1983) ACM Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 13
    • 0027541184 scopus 로고
    • A protocol for route establishment and packet forwarding across multidomain internets
    • D. Estrin, M. Steenstrup, G. Tsudik, A protocol for route establishment and packet forwarding across multidomain internets, IEEE Trans. on Networking 1 (1) (1993) 56-70.
    • (1993) IEEE Trans. on Networking , vol.1 , Issue.1 , pp. 56-70
    • Estrin, D.1    Steenstrup, M.2    Tsudik, G.3
  • 14
    • 84939353369 scopus 로고
    • Security for the DoD transmission control protocol
    • W. Diffie, Security for the DoD Transmission Control Protocol. CRYPTO'85, 1985, pp. 108-127.
    • (1985) CRYPTO'85 , pp. 108-127
    • Diffie, W.1
  • 16
    • 0022090882 scopus 로고
    • Standardizing cryptographic services at OSI higher layers
    • J.J. Tardo, Standardizing cryptographic services at OSI higher layers. IEEE Communication Magazine 23 (7) (1985) 25-29.
    • (1985) IEEE Communication Magazine , vol.23 , Issue.7 , pp. 25-29
    • Tardo, J.J.1
  • 19
    • 0027541191 scopus 로고
    • Trust requirements and performance of a fast subtransport-level protocol for secure communication
    • P. Rangan, Trust requirements and performance of a fast subtransport-level protocol for secure communication, IEEE Transactions on Software Engineering 19 (2) (1993) 181-186.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.2 , pp. 181-186
    • Rangan, P.1
  • 22
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • B. Kumar, Integration of security in network routing protocols, ACM SIGSAC Review 11 (2) (1993) 18-25.
    • (1993) ACM SIGSAC Review , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 23
    • 0041296839 scopus 로고
    • Integrating security in inter-domain routing protocols
    • B. Kumar, J. Crowcroft, Integrating security in inter-domain routing protocols. ACM Computer Commun. Review, 1993, 36-51.
    • (1993) ACM Computer Commun. Review , pp. 36-51
    • Kumar, B.1    Crowcroft, J.2
  • 24
    • 0042298471 scopus 로고
    • Presentation in panel on 'security architecture for the internet infrastructure'
    • Apr.
    • S.L. Murphy. Presentation in panel on 'security architecture for the internet infrastructure'. Symposium on Network and Distributed System Security, Apr. 1995.
    • (1995) Symposium on Network and Distributed System Security
    • Murphy, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.