메뉴 건너뛰기




Volumn , Issue , 2005, Pages 128-138

Aggregated path authentication for efficient BGP security

Author keywords

Authentication; BGP; Performance; Routing; Security

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PERFORMANCE; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; REAL TIME SYSTEMS; ROUTERS; SECURITY OF DATA;

EID: 33745774761     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102139     Document Type: Conference Paper
Times cited : (100)

References (46)
  • 2
    • 23044435243 scopus 로고    scopus 로고
    • Efficient implementation of pairing-based cryptosytems
    • September
    • Paulo S. L. M. Barreto, Ben Lynn, and Michael Scott. Efficient Implementation of Pairing-Based Cryptosytems. Journal of Cryptology, 17(4):321-334, September 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 321-334
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 3
    • 27244435853 scopus 로고    scopus 로고
    • A note on efficient computation of cube roots in characteristic 3
    • Paulo S.L.M. Berreto. A note on efficient computation of cube roots in characteristic 3. Cryptology ePrint Archive, Report 2004/305. http://eprint.iacr.org/2004/305, 2004.
    • (2004) Cryptology EPrint Archive, Report 2004/305
    • Berreto, P.S.L.M.1
  • 4
    • 4143140890 scopus 로고    scopus 로고
    • A survey of two signature aggregation techniques
    • Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. A Survey of Two Signature Aggregation Techniques. RSA CryptoBytes, 6(2):1-10, 2003.
    • (2003) RSA CryptoBytes , vol.6 , Issue.2 , pp. 1-10
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 5
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • number 2656 LNCS, Springer-Verlag
    • Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of Eurocrypt 2003, number 2656 in LNCS, pages 416-432. Springer-Verlag, 2003.
    • (2003) Proceedings of Eurocrypt 2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 6
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • number 2248 in LNCS, Springer-Verlag
    • Dan Boneh, Ben Lynn, and Hovav Shacham. Short Signatures from the Weil Pairing. In Proceedings of Asiacrypt 2001, number 2248 in LNCS, pages 514-532. Springer-Verlag, 2001.
    • (2001) Proceedings of Asiacrypt 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 23044435711 scopus 로고    scopus 로고
    • Short signature from the weil pairing
    • Dan Boneh, Ben Lynn, and Hovav Shacham. Short Signature from the Weil Pairing. Journal of Cryptology, 17(4):297-319, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the internet topology
    • ACM Press
    • Michalis Faloutsos, Petrof Faloutsos, and Christos Faloutsos. On Power-Law Relationships of the Internet Topology. In Proceedings of ACM SIGCOMM'99, pages 251-262. ACM Press, 1999.
    • (1999) Proceedings of ACM SIGCOMM'99 , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 11
    • 84968502759 scopus 로고
    • A remark considering m-divisibility in the divisor class group of curves
    • G. Frey and H. Ruck. A remark considering m-divisibility in the divisor class group of curves. Mathematics of Computation, 62:865-874, 1994.
    • (1994) Mathematics of Computation , vol.62 , pp. 865-874
    • Frey, G.1    Ruck, H.2
  • 12
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the tate pairing
    • In Algorithm Number Theory Symposium - ANTS V, Springer-Verlag
    • S. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. In Algorithm Number Theory Symposium - ANTS V, volume 2369 of LNCS, pages 324-337. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 13
    • 0035704351 scopus 로고    scopus 로고
    • On Inferring autonomous system relationships in the internet
    • December
    • Lixin Gao. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking (TON), 9(6):733-745, December 2001.
    • (2001) IEEE/ACM Transactions on Networking (TON) , vol.9 , Issue.6 , pp. 733-745
    • Gao, L.1
  • 15
    • 0013144099 scopus 로고    scopus 로고
    • Efficient and secure network routing algorithms
    • January
    • Michael Goodrich. Efficient and Secure Network Routing Algorithms. provisional patent filing, http://www.cs.jhu.edu/~goodrich/cgc/pubs/rout-ing.pdf, January 2001.
    • (2001) Provisional Patent Filing
    • Goodrich, M.1
  • 18
    • 0033204412 scopus 로고    scopus 로고
    • An analysis of BGP convergence properties
    • August
    • Timothy G. Griffin and Gordon Wilfong. An Analysis of BGP Convergence Properties. In Proceedings of SIGCOMM 1999, pages 277-288, August 1999.
    • (1999) Proceedings of SIGCOMM 1999 , pp. 277-288
    • Griffin, T.G.1    Wilfong, G.2
  • 20
    • 0141813552 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • April
    • R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC3280, http://www.ietf.org/rfc3280.txt, April 2002.
    • (2002) RFC3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 22
    • 21844463097 scopus 로고    scopus 로고
    • SPY: Secure path vector routing for securing BGP
    • ACM Press, August
    • Yih-Chun Hu, Adrian Perrig, and Marvin Sirbu. SPY: Secure Path Vector Routing for Securing BGP. In Proceedings of SIGCOMM 2004, pages 179-192. ACM Press, August 2004.
    • (2004) Proceedings of SIGCOMM 2004 , pp. 179-192
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 28
    • 35048877778 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor permutations
    • In Eurocrypt 2004, Springer-Verlag
    • Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, and Hovav Shacham. Sequential Aggregate Signatures from Trapdoor Permutations. In Eurocrypt 2004, volume 3027 of LNCS, pages 74-90. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 31
    • 22144445920 scopus 로고    scopus 로고
    • The weil pairing, and its efficient calculation
    • September
    • Victor S. Miller. The Weil Pairing, and Its Efficient Calculation. Journal of Cryptology, 17(4):235-261, September 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.S.1
  • 32
    • 33745791193 scopus 로고    scopus 로고
    • Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL).
    • Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL).
  • 38
    • 0003247246 scopus 로고
    • A border gateway protocol 4 (BGP-4)
    • March
    • Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC1771, http://www.ietf.org/rfc1771.txt, March 1995.
    • (1995) RFC1771
    • Rekhter, Y.1    Li, T.2
  • 39
    • 84858916584 scopus 로고    scopus 로고
    • The Route Views Project. http://www.antc.uoregon.edu/route-views/.
  • 40
    • 35048849890 scopus 로고    scopus 로고
    • Compressed pairings
    • number 3152 in LNCS, Springer-Verlag, Updated version: Cryptology ePrint Archive, Report 2004/032.
    • M. Scott and Paulo S.L.M. Barreto. Compressed Pairings. In Advances in Cryptology - CRYPTO'2004, number 3152 in LNCS, pages 140-156. Springer-Verlag, 2004. Updated version: Cryptology ePrint Archive, Report 2004/032. http://eprint.iacr.org/2004/032.
    • (2004) Advances in Cryptology - CRYPTO'2004 , pp. 140-156
    • Scott, M.1    Barreto, P.S.L.M.2
  • 41
    • 0032026162 scopus 로고    scopus 로고
    • Efficient security mechanisms for the border gateway routing protocol
    • B. Smith and J.J. Garcia-Luna-Aceves. Efficient Security Mechanisms for the Border Gateway Routing Protocol. Computer Communications (Elsevier), 21(3):203-210, 1998.
    • (1998) Computer Communications (Elsevier) , vol.21 , Issue.3 , pp. 203-210
    • Smith, B.1    Garcia-Luna-Aceves, J.J.2
  • 44
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin BGP
    • September
    • Russ White. Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3): 15-22, September 2003.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 15-22
    • White, R.1
  • 46
    • 33745769875 scopus 로고    scopus 로고
    • Evaluating the performance impact of PKI on BGP security
    • April
    • Meiyuan Zhao, Sean W. Smith, and David M. Nicol. Evaluating the Performance Impact of PKI on BGP Security. In 4th Annual PKI R&D Workshop, April 2005.
    • (2005) 4th Annual PKI R&D Workshop
    • Zhao, M.1    Smith, S.W.2    Nicol, D.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.