-
2
-
-
11244282960
-
Origin authentication in interdomain routing
-
Washington, D.C
-
AIELLO, W., IOANNIDIS, J., AND MCDANIEL, P. 2003. Origin authentication in interdomain routing. In Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, D.C., 165-178.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 165-178
-
-
AIELLO, W.1
IOANNIDIS, J.2
MCDANIEL, P.3
-
4
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
BELLOVIN, S. 1989. Security problems in the TCP/IP protocol suite. Computer Communications Review. 19, 32-48.
-
(1989)
Computer Communications Review
, vol.19
, pp. 32-48
-
-
BELLOVIN, S.1
-
6
-
-
34547531066
-
Using link cuts to attack internet routing
-
Unpublished manuscript
-
BELLOVIN, S. AND GANSNER, E. 2003. Using link cuts to attack internet routing. Unpublished manuscript.
-
(2003)
-
-
BELLOVIN, S.1
GANSNER, E.2
-
8
-
-
35048887476
-
Short group signatures
-
BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Proceedings of Crypto 2004. Vol. 3152. 41-55.
-
(2004)
Proceedings of Crypto
, vol.3152
, pp. 41-55
-
-
BONEH, D.1
BOYEN, X.2
SHACHAM, H.3
-
9
-
-
0025386404
-
A logic of authentication
-
39. Digital Systems Research Center of Digital Equipment Corporation, Palo Alto, CA, 1Feb, 18-36
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. 1990. A logic of authentication. In Research Report 39. Digital Systems Research Center of Digital Equipment Corporation, Palo Alto, CA, 8, 1(Feb.), 18-36.
-
(1990)
Research Report
, vol.8
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.3
-
10
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
DEMPSTER, A. 1967. Upper and lower probabilities induced by a multivalued mapping. The Annals of Statistics 28, 325-339.
-
(1967)
The Annals of Statistics
, vol.28
, pp. 325-339
-
-
DEMPSTER, A.1
-
11
-
-
34547518418
-
-
DHS. 2005. DHS secure routing workshop. Department of Homeland Security, Washington, D.C.
-
DHS. 2005. DHS secure routing workshop. Department of Homeland Security, Washington, D.C.
-
-
-
-
12
-
-
0025771853
-
Applying a formal analysis technique to the CCIT X.509 strong two-way authentication protocol
-
GAARDER, K. AND SNEKKENES, E. 1991. Applying a formal analysis technique to the CCIT X.509 strong two-way authentication protocol. Journal of Cryptology 3, 81-98.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 81-98
-
-
GAARDER, K.1
SNEKKENES, E.2
-
13
-
-
0034478521
-
Inferring autonomous system relationships in the Internet
-
GAO, L. 2000. Inferring autonomous system relationships in the Internet. In IEEE Global Internet.
-
(2000)
IEEE Global Internet
-
-
GAO, L.1
-
14
-
-
85028743437
-
Logics for cryptographic protocolsvirtues and limitations
-
Los Alamitos, CA
-
GLIGOR, V., KAILAR, R., STUBBLEBINE, S., AND GONG, L. 1991. Logics for cryptographic protocolsvirtues and limitations. In Proceedings of the Computer Security Foundations Workshop IV. Los Alamitos, CA. 219-226.
-
(1991)
Proceedings of the Computer Security Foundations Workshop IV
, pp. 219-226
-
-
GLIGOR, V.1
KAILAR, R.2
STUBBLEBINE, S.3
GONG, L.4
-
15
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
San Diego, CA
-
GOODELL, G., AIELLO, W., GRIFFIN, T., IOANNIDIS, J., MCDANIEL, P., AND RUBIN, A. 2003. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proceedings of the 2003 ISOCSymposium on Network and Distributed Systems Security (NDSS'03). San Diego, CA. 75-85.
-
(2003)
Proceedings of the 2003 ISOCSymposium on Network and Distributed Systems Security (NDSS'03)
, pp. 75-85
-
-
GOODELL, G.1
AIELLO, W.2
GRIFFIN, T.3
IOANNIDIS, J.4
MCDANIEL, P.5
RUBIN, A.6
-
16
-
-
4344670280
-
Deploying and using public key technology: Lessons learned in real life
-
GUIDA, R., STAHL, R., BUNT, T., SECREST, G., AND MOORCONES, J. 2004. Deploying and using public key technology: Lessons learned in real life. IEEE Security and Privacy (July/Aug.). 67-71.
-
(2004)
IEEE Security and Privacy (July/Aug.)
, pp. 67-71
-
-
GUIDA, R.1
STAHL, R.2
BUNT, T.3
SECREST, G.4
MOORCONES, J.5
-
19
-
-
34547551024
-
-
HOUSLEY, R., FORD, W., POLK, W., AND SOLO, D. 1999. Internet X.509 public key infrastructure-certificate and CRL profile. IETF RFC 2459.
-
HOUSLEY, R., FORD, W., POLK, W., AND SOLO, D. 1999. Internet X.509 public key infrastructure-certificate and CRL profile. IETF RFC 2459.
-
-
-
-
20
-
-
26444521917
-
SPV: Secure path vector routing for securing BGP
-
Portland, OR
-
HU, Y., PERRIG, A., AND SIRBU, M. 2004. SPV: Secure path vector routing for securing BGP. In Proceedings of ACM 2004 SIGCOMM. Portland, OR.
-
(2004)
Proceedings of ACM 2004 SIGCOMM
-
-
HU, Y.1
PERRIG, A.2
SIRBU, M.3
-
26
-
-
34547519314
-
An infrastructure supporting secure internet routing
-
KENT, S. 2006. An infrastructure supporting secure internet routing. In Third European PKI Workshop.
-
(2006)
Third European PKI Workshop
-
-
KENT, S.1
-
29
-
-
84867338222
-
Secure border gateway protocol (S-BGP) real world performance and deployment issues
-
KENT, S., LYNN, C., MIKKELSON, J., AND SEO, K. 2000. Secure border gateway protocol (S-BGP) real world performance and deployment issues. In Proceedings of the 2000 ISOC Symposium on Network and Distributed Systems Security (NDSS'00).
-
(2000)
Proceedings of the 2000 ISOC Symposium on Network and Distributed Systems Security (NDSS'00)
-
-
KENT, S.1
LYNN, C.2
MIKKELSON, J.3
SEO, K.4
-
30
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
Apr, 582-592
-
KENT, S., LYNN, C., AND SEO, K. 2000. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications 18, 4 (Apr.), 582-592.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, pp. 4
-
-
KENT, S.1
LYNN, C.2
SEO, K.3
-
31
-
-
34547552731
-
-
KOBLITZ, N. AND MENEZES, A. 2004. Another look at provable security. Cryptology ePrint Archive, Report 2004/152. To Appear in Journal of Cryptology. http://eprint.iacr.org/2004/152/.
-
KOBLITZ, N. AND MENEZES, A. 2004. Another look at "provable security." Cryptology ePrint Archive, Report 2004/152. To Appear in Journal of Cryptology. http://eprint.iacr.org/2004/152/.
-
-
-
-
32
-
-
21844446420
-
Topology-based detection of anomalous BGP messages
-
KRUEGEL, C., MUTZ, D., ROBERTSON, W., AND VALEUR, F. 2003. Topology-based detection of anomalous BGP messages. In Proceedings of the 6th Symposium on Recent Advances in Intrusion Detection (RAID'03).
-
(2003)
Proceedings of the 6th Symposium on Recent Advances in Intrusion Detection (RAID'03)
-
-
KRUEGEL, C.1
MUTZ, D.2
ROBERTSON, W.3
VALEUR, F.4
-
33
-
-
34547541092
-
-
KUMAR, B. AND CROWCROFT, J. 1993. Integrating security in interdomain routing protocols. ACM SIGCOMM Computer Communication Review 23, 5 (Oct.), 36-51.
-
KUMAR, B. AND CROWCROFT, J. 1993. Integrating security in interdomain routing protocols. ACM SIGCOMM Computer Communication Review 23, 5 (Oct.), 36-51.
-
-
-
-
34
-
-
34547497426
-
-
LYNN, C., KENT, S., AND SEO, K. 2003. X.509 Extensions for IP Addresses and AS Identifiers. draft-ietf-pkix-x509- ipaddr-as-extn-02.txt.
-
LYNN, C., KENT, S., AND SEO, K. 2003. X.509 Extensions for IP Addresses and AS Identifiers. draft-ietf-pkix-x509- ipaddr-as-extn-02.txt.
-
-
-
-
37
-
-
33645790758
-
-
Analysis. draft-murphy-bgp-vuln-00.txt
-
MURPHYS. 2002a. BGP Security Vulnerabilities Analysis. draft-murphy-bgp-vuln-00.txt.
-
(2002)
BGP Security Vulnerabilities
-
-
MURPHYS1
-
38
-
-
21844439293
-
-
draft-murphy-bgp- protect-00.txt
-
MURPHYS. 2002b. BGP Security Protections, draft-murphy-bgp- protect-00.txt.
-
(2002)
BGP Security Protections
-
-
MURPHYS1
-
39
-
-
3042699520
-
Evaluation of efficient security for BGP route announcements using parallel simulation
-
NICOL, D., SMITH, S., AND ZHAO, M. 2004. Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Pratice and Theory Journal, Special Issue on Modeling, 187-216.
-
(2004)
Simulation Pratice and Theory Journal, Special Issue on Modeling
, pp. 187-216
-
-
NICOL, D.1
SMITH, S.2
ZHAO, M.3
-
40
-
-
0003828107
-
Network layer protocols with byzantine robustness
-
Tech. Rep. MIT/LCS/TR-429
-
PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Tech. Rep. MIT/LCS/TR-429.
-
(1988)
-
-
PERLMAN, R.1
-
42
-
-
34547549087
-
-
REKHTER, Y. AND LI, T. 1995. Aborder gateway protocol 4(BGP 4). IETF RFC 1771.
-
REKHTER, Y. AND LI, T. 1995. Aborder gateway protocol 4(BGP 4). IETF RFC 1771.
-
-
-
-
47
-
-
83255186150
-
Listen and whisper: Security mechanisms for BGP
-
San Francisco, CA
-
SUBRAMANIAN, L., ROTH, V., STOICA, I., SHENKER, S., AND KATZ, R. 2004. Listen and whisper: Security mechanisms for BGP. In Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI'04), San Francisco, CA.
-
(2004)
Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI'04)
-
-
SUBRAMANIAN, L.1
ROTH, V.2
STOICA, I.3
SHENKER, S.4
KATZ, R.5
-
48
-
-
34547545716
-
-
IETF RFC 2725
-
VILLAMIZAR, C., ALAETTINOGLU, C., MEYER, D., AND MURPHY, S. 1999. Routing policy system security. IETF RFC 2725.
-
(1999)
Routing policy system security
-
-
VILLAMIZAR, C.1
ALAETTINOGLU, C.2
MEYER, D.3
MURPHY, S.4
-
50
-
-
34547543285
-
S-RIP: A secure distance vector routing protocol
-
WAN, T., KRANAKIS, E., AND VAN OORSCHOT, P. 2004. S-RIP: A secure distance vector routing protocol. In Proceedings of the Applied Cryptography and Network Security (ACNS'04). Vol. 3089. 103-119.
-
(2004)
Proceedings of the Applied Cryptography and Network Security (ACNS'04)
, vol.3089
, pp. 103-119
-
-
WAN, T.1
KRANAKIS, E.2
VAN OORSCHOT, P.3
-
51
-
-
85180417570
-
Pretty secure BGP (psBGP)
-
San Diego, CA
-
WAN, T., KRANAKIS, E., AND VAN OORSCHOT, P. 2005. Pretty secure BGP (psBGP). In Proceedings of the 2005 ISOC Symposium on Network and Distributed Systems Security (NDSS'05). San Diego, CA.
-
(2005)
Proceedings of the 2005 ISOC Symposium on Network and Distributed Systems Security (NDSS'05)
-
-
WAN, T.1
KRANAKIS, E.2
VAN OORSCHOT, P.3
-
52
-
-
34547540445
-
-
WAN, T., VAN OORSCHOT, P., AND KRANAKIS, E. 2007. A selective introduction to border gateway protocol (BGP) security issues. In Proceedings of the NATO Advanced Studies Institute on Network Security and Intrusion Detection. Nork, Yerevan, Armenia. IOS Press (to appear, 2007).
-
WAN, T., VAN OORSCHOT, P., AND KRANAKIS, E. 2007. A selective introduction to border gateway protocol (BGP) security issues. In Proceedings of the NATO Advanced Studies Institute on Network Security and Intrusion Detection. Nork, Yerevan, Armenia. IOS Press (to appear, 2007).
-
-
-
-
53
-
-
27544500277
-
Securing BGP through secure origin BGP
-
WHITE, R. 2003. Securing BGP through secure origin BGP. The Internet Protocol Journal 6, 3, 15-22.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 15-22
-
-
WHITE, R.1
-
54
-
-
27544502681
-
-
Addison-Wesley, Reading, MA
-
WHITE, R., MCPHERSON, D., AND SANGLI, S. 2004. Practical BGP. Addison-Wesley, Reading, MA.
-
(2004)
Practical BGP
-
-
WHITE, R.1
MCPHERSON, D.2
SANGLI, S.3
-
55
-
-
33745774761
-
Aggregated path authentciation for efficient BGP security
-
Alexandria, VA
-
ZHAO, M., SMITH, S., AND NICOL, D. 2005a. Aggregated path authentciation for efficient BGP security. In Proceedings of 12th ACM Conference on Computer and Communications Security. Alexandria, VA.
-
(2005)
Proceedings of 12th ACM Conference on Computer and Communications Security
-
-
ZHAO, M.1
SMITH, S.2
NICOL, D.3
-
56
-
-
29244453338
-
Evaluating the performance impact of PKI on BGP security
-
Gaithersburg, MD
-
ZHAO, M., SMITH, S., AND NICOL, D. 2005b. Evaluating the performance impact of PKI on BGP security. In Proceedings of 4th Annual PKI Research Workshop (PKI'05). Gaithersburg, MD.
-
(2005)
Proceedings of 4th Annual PKI Research Workshop (PKI'05)
-
-
ZHAO, M.1
SMITH, S.2
NICOL, D.3
|