-
6
-
-
0033326181
-
Packet reordering is not pathological network behavior
-
J. C. R. Bennett, C. Partridge, and N. Shectman. Packet reordering is not pathological network behavior. IEEE/ACM Transactions on Networking (TON), 7(6):789-798, 1999.
-
(1999)
IEEE/ACM Transactions on Networking (TON)
, vol.7
, Issue.6
, pp. 789-798
-
-
Bennett, J.C.R.1
Partridge, C.2
Shectman, N.3
-
7
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. Lec. Notes in CS, 1666:216-233, 1999.
-
(1999)
Lec. Notes in CS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
8
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July '70
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Comm. of the ACM, 13(7):422-426, July '70.
-
Comm. of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
9
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson. Detecting disruptive routers: A distributed network monitoring approach. In Proc. of the IEEE Symposium on Security and Privacy, pages 115-124, May 1998.
-
(1998)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
10
-
-
0030102105
-
Unreliable failure detectors for reliable distributed systems
-
T. D. Chandra and S. Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225-267, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.2
, pp. 225-267
-
-
Chandra, T.D.1
Toueg, S.2
-
11
-
-
0022020346
-
Distributed snapshots: Determining global states of distributed systems
-
K. M. Chandy and L. Lamport. Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computer Systems, 3(1):63-75, 1985.
-
(1985)
ACM Transactions on Computer Systems
, vol.3
, Issue.1
, pp. 63-75
-
-
Chandy, K.M.1
Lamport, L.2
-
12
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
S. Cheung. An efficient message authentication scheme for link state routing. In ACSAC, pages 90-98, 1997.
-
(1997)
ACSAC
, pp. 90-98
-
-
Cheung, S.1
-
13
-
-
0013294745
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
S. Cheung and K. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop, 1997.
-
(1997)
New Security Paradigms Workshop
-
-
Cheung, S.1
Levitt, K.2
-
16
-
-
0033650827
-
Trajectory sampling for direct traffic observation
-
N. G. Duffield and M. Grossglauser. Trajectory sampling for direct traffic observation. In SIGCOMM'00, pages 271-282.
-
SIGCOMM'00
, pp. 271-282
-
-
Duffield, N.G.1
Grossglauser, M.2
-
17
-
-
0142213065
-
Security: Adding protection to the network via the network processor
-
Aug.
-
W. Feghali, B. Burres, G. Wolrich, and D. Carrigan. Security: Adding protection to the network via the network processor. Intel Technology Journal, 06:40-49, Aug. 2002.
-
(2002)
Intel Technology Journal
, vol.6
, pp. 40-49
-
-
Feghali, W.1
Burres, B.2
Wolrich, G.3
Carrigan, D.4
-
20
-
-
0034848036
-
Early detection of message forwarding faults
-
A. Herzberg and S. Kutten. Early detection of message forwarding faults. SIAM J. Comput., 30(4): 1169-1196, 2000.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1169-1196
-
-
Herzberg, A.1
Kutten, S.2
-
21
-
-
0003976889
-
Trends in denial of service attack technology
-
CERT Coordination Center, Oct.
-
K. J. Houle, G. M. Weaver, N. Long, and R. Thomas. Trends in denial of service attack technology. Technical report, CERT Coordination Center, Oct. 2001.
-
(2001)
Technical Report
-
-
Houle, K.J.1
Weaver, G.M.2
Long, N.3
Thomas, R.4
-
23
-
-
0033702951
-
Using conservation of flow as a security mechanism in network protocols
-
J. R. Hughes, T. Aura, and M. Bishop. Using conservation of flow as a security mechanism in network protocols. In IEEE Symp. on Security and Privacy, pages 132-131, 2000.
-
(2000)
IEEE Symp. on Security and Privacy
, pp. 132-1131
-
-
Hughes, J.R.1
Aura, T.2
Bishop, M.3
-
24
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
Y. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In DISCEX'00 Proceedings, volume 2, pages 69-83, 2000.
-
(2000)
DISCEX'00 Proceedings
, vol.2
, pp. 69-83
-
-
Jou, Y.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.5
Chang, H.6
Wang, F.7
-
26
-
-
0033743163
-
Secure border gateway protocol (secure-BGP)
-
Apr.
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure Border Gateway Protocol (Secure-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582-592, Apr. 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
28
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Trans. on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
31
-
-
0038632390
-
-
Mar.
-
A. Morton, L. Ciavattone, G. Ramachandran, S. Shalunov, and J. Perser. Packet reordering metric for IPPM, Mar. 2003.
-
(2003)
Packet Reordering Metric for IPPM
-
-
Morton, A.1
Ciavattone, L.2
Ramachandran, G.3
Shalunov, S.4
Perser, J.5
-
32
-
-
0003499459
-
Multicast extensions to OSPF
-
Mar.
-
J. T. Moy. Multicast extensions to OSPF. RFC 1584, IETF, Mar. 1994.
-
(1994)
RFC 1584, IETF
-
-
Moy, J.T.1
-
33
-
-
34248682000
-
Data encryption standard
-
Oct.
-
National Institute of Standards and Technology. Data encryption standard. FIPS PUBS 46-3, Oct. 1999.
-
(1999)
FIPS PUBS
, vol.46
, Issue.3
-
-
-
34
-
-
84965066515
-
Advanced encryption standard
-
Nov.
-
National Institute of Standards and Technology. Advanced encryption standard. FIPS PUBS 197, Nov. 2001.
-
(2001)
FIPS PUBS
, vol.197
-
-
-
35
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
V. N. Padmanabhan and D. Simon. Secure traceroute to detect faulty or malicious routing. SIGCOMM Comp. Comm. Review, 33(1):77-82, 2003.
-
(2003)
SIGCOMM Comp. Comm. Review
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.N.1
Simon, D.2
-
40
-
-
0003703503
-
-
Master's thesis, University of California, Berkeley, September
-
N. Shah. Understanding network processors. Master's thesis, University of California, Berkeley, September 2001.
-
(2001)
Understanding Network Processors
-
-
Shah, N.1
-
41
-
-
0036947484
-
Beyond folklore: Observations on fragmented traffic
-
C. Shannon, D. Moore, and K. C. Claffy. Beyond folklore: observations on fragmented traffic. IEEE/ACM Trans. Netw., 10(6):709-720, 2002.
-
(2002)
IEEE/ACM Trans. Netw.
, vol.10
, Issue.6
, pp. 709-720
-
-
Shannon, C.1
Moore, D.2
Claffy, K.C.3
-
44
-
-
83255186150
-
Listen and Whisper: Security Mechanisms for BGP
-
Mar.
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proc. of NSDI, Mar. 2004.
-
(2004)
Proc. of NSDI
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
46
-
-
18844407985
-
In search of path diversity in ISP networks
-
R. Teixeira, K. Marzullo, S. Savage, and G. M. Voelker. In search of path diversity in ISP networks. In Proc. of the ACM/SIGCOMM IMC, pages 313-318, 2003.
-
(2003)
Proc. of the ACM/SIGCOMM IMC
, pp. 313-318
-
-
Teixeira, R.1
Marzullo, K.2
Savage, S.3
Voelker, G.M.4
|