메뉴 건너뛰기




Volumn 33, Issue 1, 2003, Pages 77-82

Secure traceroute to detect faulty or malicious routing

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; PACKET NETWORKS; PROBLEM SOLVING; ROBUSTNESS (CONTROL SYSTEMS); TELECOMMUNICATION TRAFFIC;

EID: 2342630172     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/774763.774775     Document Type: Conference Paper
Times cited : (79)

References (16)
  • 1
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 16-20 August 1992. Springer-Verlag
    • C. Dwork and M. Naor. "Pricing Via Processing or Combatting Junk Mail", In Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 139-147, 16-20 August 1992. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 3
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks
    • June
    • Y. C. Hu, D. B. Johnson, and A. Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", IEEE WMCSA 2002, June 2002.
    • (2002) IEEE WMCSA 2002
    • Hu, Y.C.1    Johnson, D.B.2    Perrig, A.3
  • 4
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile Ad Hoc networks
    • October
    • J. P. Hubaux, L. Buttyan, and S. Capkun. "The Quest for Security in Mobile Ad Hoc Networks", ACM MobiHoc 2001, October 2001.
    • (2001) ACM MobiHoc 2001
    • Hubaux, J.P.1    Buttyan, L.2    Capkun, S.3
  • 6
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • November
    • S. Kent and R. Atkinson. "Security Architecture for the Internet Protocol", RFC 2401, November 1998
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 8
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile Ad Hoc networks
    • August
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", ACM Mobicom 2000, August 2000.
    • (2000) ACM Mobicom 2000
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 9
    • 0003828107 scopus 로고
    • Ph.D. Thesis, Department of Electrical Engineering and Computer Science, MIT, August
    • R. Perlman. "Network Layer Protocols with Byzantine Robustness", Ph.D. Thesis, Department of Electrical Engineering and Computer Science, MIT, August 1988.
    • (1988) Network Layer Protocols with Byzantine Robustness
    • Perlman, R.1
  • 12
  • 14
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • H. Federrath, editor, LNCS, Springer-Verlag
    • P.F. Syverson, G. Tsudik, M. G. Reed, and C. E. Landwehr. "Towards an Analysis of Onion Routing Security". In H. Federrath, editor, Designing Privacy Enhancing Technologies, vol. 2009 of LNCS, pp. 96-114. Springer-Verlag, 2001.
    • (2001) Designing Privacy Enhancing Technologies , vol.2009 , pp. 96-114
    • Syverson, P.F.1    Tsudik, G.2    Reed, M.G.3    Landwehr, C.E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.