메뉴 건너뛰기




Volumn , Issue , 2004, Pages 239-244

Structure preserving anonymization of router configuration data

Author keywords

Data anonymization; Router configuration; Security

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; NETWORK PROTOCOLS; PROGRAM COMPILERS; SECURITY OF DATA; TOPOLOGY;

EID: 14944358967     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1028788.1028819     Document Type: Conference Paper
Times cited : (9)

References (8)
  • 3
    • 14944367079 scopus 로고    scopus 로고
    • Structure preserving anonymization of router configuration data
    • Carnegie Mellon University
    • D. A. Maltz, J. Zhan, G. Xie, H. Zhang, G. Hjalmtysson, A. Greenberg, and J. Rexford, "Structure preserving anonymization of router configuration data," Tech. Rep. CMU-CS-04-149, Carnegie Mellon University, 2004.
    • (2004) Tech. Rep. , vol.CMU-CS-04-149
    • Maltz, D.A.1    Zhan, J.2    Xie, G.3    Zhang, H.4    Hjalmtysson, G.5    Greenberg, A.6    Rexford, J.7
  • 4
    • 24344436696 scopus 로고    scopus 로고
    • Prefix preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • October
    • J. Xu, J. Fan, M. Ammar, and S. B. Moon, "Prefix preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme," in Proc. International Conference on Network Protocols, October 2002.
    • (2002) Proc. International Conference on Network Protocols
    • Xu, J.1    Fan, J.2    Ammar, M.3    Moon, S.B.4
  • 7
    • 84860108016 scopus 로고    scopus 로고
    • Thoughts on how to mount an attack on tcpdpriv's "-a50" option
    • T. Ylonen, "Thoughts on how to mount an attack on tcpdpriv's "-a50" option...." Web White Paper available from http://ita.ee.lbl.gov/html/contrib/attack50/attack50.html.
    • Web White Paper
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.