메뉴 건너뛰기




Volumn , Issue , 2007, Pages 147-156

Truth in advertising: Lightweight verification of route integrity

Author keywords

BGP; Interdomain routing; Security

Indexed keywords

CRYPTOGRAPHY; FAILURE ANALYSIS; INTERNET; SOFTWARE PROTOTYPING; VERIFICATION;

EID: 36849023890     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1281100.1281123     Document Type: Conference Paper
Times cited : (32)

References (23)
  • 2
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. CACM, 13(7):422-426, 1970.
    • (1970) CACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 0034206002 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area web cache sharing protocol
    • L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Trans. Netw., 8(3):281-293, 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.3 , pp. 281-293
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.Z.4
  • 7
    • 20744433444 scopus 로고    scopus 로고
    • Space efficient hash tables with worst case constant access time
    • D. Fotakis, R. Pagh, P. Sanders, and P. G. Spirakis. Space efficient hash tables with worst case constant access time. In Proc. STACS, 2003.
    • (2003) Proc. STACS
    • Fotakis, D.1    Pagh, R.2    Sanders, P.3    Spirakis, P.G.4
  • 9
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proc. NDSS, 2003.
    • (2003) Proc. NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 17
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V. Padmanabhan and D. Simon. Secure traceroute to detect faulty or malicious routing. SIGCOMM Comp. Comm. Review, 33(1):77-82, 2003.
    • (2003) SIGCOMM Comp. Comm. Review , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.1    Simon, D.2
  • 18
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end internet packet dynamics
    • V. Paxson. End-to-end internet packet dynamics. IEEE/ACM Trans. Netw., 7(3):277-292, 1999.
    • (1999) IEEE/ACM Trans. Netw , vol.7 , Issue.3 , pp. 277-292
    • Paxson, V.1
  • 21
    • 0002054139 scopus 로고    scopus 로고
    • Providing guaranteed services without per-flow management
    • I. Stoica and H. Zhang. Providing guaranteed services without per-flow management. In Proc. SIGCOMM, 1999.
    • (1999) Proc. SIGCOMM
    • Stoica, I.1    Zhang, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.