-
1
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellovin, S.M. Security problems in the TCP/IP protocol suite. Computer Communication Review 19, 2 (1989), 32-48.
-
(1989)
Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
2
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Nov.
-
Chakrabarti, A. and Manimaran, G. Internet infrastructure security: A taxonomy. IEEE Network 16, 6 (Nov. 2002), 13-21.
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
3
-
-
85017067350
-
Real-time protocol analysis for detecting link-state routing protocol attacks
-
Feb.
-
Chang, H.Y., Wu, S.F., and Jou, Y.F. Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Transactions on Information and System Security 4, (Feb. 2001), 1-36.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 1-36
-
-
Chang, H.Y.1
Wu, S.F.2
Jou, Y.F.3
-
4
-
-
33749059555
-
Authentication/confidentiality for OSPFv3
-
Dec.
-
Gupta, M. and Melam, N.S. Authentication/confidentiality for OSPFv3. IETF Internet draft, (Dec. 2004).
-
(2004)
IETF Internet Draft
-
-
Gupta, M.1
Melam, N.S.2
-
5
-
-
0003976889
-
Trends in denial of service attack technology
-
Houle, K.J., Weaver, G.M., Long, N, and Thomas, R. Trends in denial of service attack technology. CERT Coordination Center document, 2001.
-
(2001)
CERT Coordination Center Document
-
-
Houle, K.J.1
Weaver, G.M.2
Long, N.3
Thomas, R.4
-
6
-
-
0038308135
-
A double authentication scheme to detect impersonation attacks in link-state routing protocols
-
May
-
Huang, D., Sinha, A., and Medhi, D. A double authentication scheme to detect impersonation attacks in link-state routing protocols. In Proceedings of the IEEE International Conference on Communications (May 2003), 1723-1727.
-
(2003)
Proceedings of the IEEE International Conference on Communications
, pp. 1723-1727
-
-
Huang, D.1
Sinha, A.2
Medhi, D.3
-
8
-
-
14544302192
-
A Key-chain based keying scheme for many-to-many secure group communication
-
Nov.
-
Huang, D. and Medhi, D. A Key-chain based keying scheme for many-to-many secure group communication. ACM Transactions on Information and System Security 7, 4 (Nov. 2004), 523-552.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 523-552
-
-
Huang, D.1
Medhi, D.2
-
9
-
-
0032184071
-
Internet routing instability
-
Labovitz, C., Malan, G.R., and Jahanian, F. Internet routing instability. IEEE/ACM Transactions on Networking 6 (1998), 515-528.
-
(1998)
IEEE/ACM Transactions on Networking
, vol.6
, pp. 515-528
-
-
Labovitz, C.1
Malan, G.R.2
Jahanian, F.3
-
10
-
-
0003276078
-
OSPF version 2
-
Apr.
-
Moy, J. OSPF Version 2, IETF RFC 2328, (Apr. 1998).
-
(1998)
IETF RFC
, vol.2328
-
-
Moy, J.1
-
11
-
-
0038059502
-
OSPF with digital signatures
-
June
-
Murphy, S., Badger, M., and Wellington, B. OSPF with digital signatures. IETF RFC 2154, (June 1997).
-
(1997)
IETF RFC
, vol.2154
-
-
Murphy, S.1
Badger, M.2
Wellington, B.3
-
12
-
-
0036805086
-
Securing the Internet routing infrastructure
-
Oct.
-
Papadimitratos, P., and Haas, Z.J. Securing the Internet routing infrastructure. IEEE Communications 40, 10 (Oct. 2002), 60-68.
-
(2002)
IEEE Communications
, vol.40
, Issue.10
, pp. 60-68
-
-
Papadimitratos, P.1
Haas, Z.J.2
|