-
2
-
-
0003288391
-
Domain name system security extensions
-
(Proposed Standard), March
-
D. Eastlake 3rd. Domain Name System Security Extensions. RFC 2535 (Proposed Standard), March 1999.
-
(1999)
RFC
, vol.2535
-
-
Eastlake III, D.1
-
3
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy in interdomain routing
-
February
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proceedings of Symposium on Network and Distributed System Security (NDSS'03), February 2003.
-
(2003)
Proceedings of Symposium on Network and Distributed System Security (NDSS'03)
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
4
-
-
0041513348
-
A framework for incremental deployment strategies for router-assisted services
-
Xinming He, Christos Papadopoulos, and Pavlin Radoslavov. A framework for incremental deployment strategies for router-assisted services. In INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
He, X.1
Papadopoulos, C.2
Radoslavov, P.3
-
5
-
-
84859688599
-
-
University of Oregon route views project
-
http://www.routeviews.org/. University of Oregon route views project.
-
-
-
-
7
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
New York, NY, USA, ACM Press
-
David Kempe, Jon Kleinberg, and Eva Tardos. Maximizing the spread of influence through a social network. In KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137-146, New York, NY, USA, 2003. ACM Press.
-
(2003)
KDD '03: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
8
-
-
84867338222
-
Secure border gateway protocol (S-BGP) - Real world performance and deployment issues
-
San Diego, CA, February
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure border gateway protocol (S-BGP) - real world performance and deployment issues. In Symposium on Network and Distributed Systems Security (NDSS '00), pages 103-116, San Diego, CA, February 2000.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS '00)
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
9
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
apr
-
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582-592, apr 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
11
-
-
0034836055
-
BRITE: An approach to universal topology generation
-
A. Medina, A. Lakhina, I. Matta, and J. Byers. BRITE: An approach to universal topology generation. In Proceedings of Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS '01), 2001.
-
(2001)
Proceedings of Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS '01)
-
-
Medina, A.1
Lakhina, A.2
Matta, I.3
Byers, J.4
-
13
-
-
4544388085
-
Internet service providers and peering
-
Albuquerque, New Mexico, June
-
William B. Norton. Internet service providers and peering. In Proceedings of NANOG 19, Albuquerque, New Mexico, June 2000.
-
(2000)
Proceedings of NANOG 19
-
-
Norton, W.B.1
-
14
-
-
83255186150
-
Listen and whisper: Security mechanisms for BGP
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. of the First Symposium on Networked Systems Design and Implementation (NSDI'04), 2004.
-
(2004)
Proc. of the First Symposium on Networked Systems Design and Implementation (NSDI'04)
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
16
-
-
27544500277
-
Securing BGP through secure origin BGP
-
Technical report, September
-
R. White. Securing BGP through secure origin BGP. Technical report, Cisco Internet Protocol Journal, September 2003.
-
(2003)
Cisco Internet Protocol Journal
-
-
White, R.1
-
18
-
-
33749060897
-
A distributed reputation approach to cooperative internet routing protection
-
Harlan Yu, Jennifer Rexford, and Edward W. Felten. A distributed reputation approach to cooperative internet routing protection. In Workshop on Secure Network Protocols, 2005.
-
(2005)
Workshop on Secure Network Protocols
-
-
Yu, H.1
Rexford, J.2
Felten, E.W.3
-
22
-
-
33750345532
-
Detection of invalid routing announcements in the internet
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang. Detection of invalid routing announcements in the internet. In IEEE DSN 2002, 2002.
-
(2002)
IEEE DSN 2002
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
|