-
1
-
-
21844455852
-
A comparison of overlay routing and multihoming route control
-
Aug
-
A. Akella, J. Pang, B. Maggs, S. Seshan, and A. Shaikh. A comparison of overlay routing and multihoming route control. In Proc. ACM SIGCOMM, Aug. 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Akella, A.1
Pang, J.2
Maggs, B.3
Seshan, S.4
Shaikh, A.5
-
2
-
-
0036036742
-
Resilient Overlay Networks
-
Oct
-
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient Overlay Networks. In Proc. 18th ACM Symposium on Operating Systems Principles (SOSP), pages 131-145, Oct. 2001.
-
(2001)
Proc. 18th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 131-145
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, M.F.3
Morris, R.4
-
5
-
-
39749100457
-
-
Technical Report AT&T Labs, June
-
K. Butler, T. Farley, P. McDaniel, and J. Rexford. A survey of BGP security. Technical Report TD-5UGJ33, AT&T Labs, June 2004.
-
(2004)
A survey of BGP security
-
-
Butler, K.1
Farley, T.2
McDaniel, P.3
Rexford, J.4
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. of the ACM, 4(2), February 1981.
-
(1981)
Comm. of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
7
-
-
56649091338
-
-
IETF, Apr. Internet Draft: draft-ietf-rpsec-bgpsecrec-06.txt
-
B. Christian and T. Tauber. BGP Security Requirements. IETF, Apr. 2006. Internet Draft: draft-ietf-rpsec-bgpsecrec-06.txt.
-
(2006)
BGP Security Requirements
-
-
Christian, B.1
Tauber, T.2
-
8
-
-
85134016177
-
An evaluation of IP-based fast reroute techniques
-
P. Francios and O. Bonaventure. An evaluation of IP-based fast reroute techniques. In Proc. CoNEXT'05, 2005.
-
(2005)
Proc. CoNEXT'05
-
-
Francios, P.1
Bonaventure, O.2
-
9
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
L. Gao. On inferring autonomous system relationships in the Internet. IEEE/ACM Trans. Netw., 9(6):733-745, 2001.
-
(2001)
IEEE/ACM Trans. Netw.
, vol.9
, Issue.6
, pp. 733-745
-
-
Gao, L.1
-
10
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
Apr
-
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE JSAC, 18(4):582-592, Apr. 2000.
-
(2000)
IEEE JSAC
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
14
-
-
33847737144
-
Understanding the Network-Level Behavior of Spammers
-
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
16
-
-
83255186150
-
Listen and Whisper: Security mechanisms for BGP
-
Mar
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security mechanisms for BGP. In Proc. Symposium on Networked System Design and Implementation, Mar. 2004.
-
(2004)
Proc. Symposium on Networked System Design and Implementation
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
18
-
-
34548370626
-
MIRO: Multi-path interdomain routing
-
Sep
-
W. Xu and J. Rexford. MIRO: Multi-path interdomain routing. In Proc. ACM SIGCOMM, Sep. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Xu, W.1
Rexford, J.2
|