-
1
-
-
50349093033
-
-
Murphy S. BGP Security Vulnerabilities Analysis. IETF Internet RFC: RFC4272. 2006. ftp://ftp.rfc-editor.org/ in-notes/rfc4272.txt.
-
Murphy S. BGP Security Vulnerabilities Analysis. IETF Internet RFC: RFC4272. 2006. ftp://ftp.rfc-editor.org/ in-notes/rfc4272.txt.
-
-
-
-
2
-
-
0033743163
-
Secure Border Gateway Protocol (S-BGP)
-
Kent S, Lynn C, Seo K. Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 2000, 18(4): 582-592.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
3
-
-
0041915603
-
-
Siganos G.Faloutsos M.Faloutsos P.Faloutsos C.Power-Laws and the AS-level Internet topology. IEEE/ACM Trans.on Networking, 2003, 11:514-524.
-
Siganos G.Faloutsos M.Faloutsos P.Faloutsos C.Power-Laws and the AS-level Internet topology. IEEE/ACM Trans.on Networking, 2003, 11:514-524.
-
-
-
-
4
-
-
1942488295
-
The rich-club phenomenon in the Internet topology
-
Zhou S, Mondragon RJ. The rich-club phenomenon in the Internet topology. IEEE Communications Letters, 2004,8(3):180-182.
-
(2004)
IEEE Communications Letters
, vol.8
, Issue.3
, pp. 180-182
-
-
Zhou, S.1
Mondragon, R.J.2
-
5
-
-
44949217260
-
Research on Local Clustering of the Internet AS Level Topology. Complex Systems and Complexity
-
Zhang GQ, Zhang GQ. Research on Local Clustering of the Internet AS Level Topology. Complex Systems and Complexity Science. 2006,3(3):34-41.
-
(2006)
Science
, vol.3
, Issue.3
, pp. 34-41
-
-
Zhang, G.Q.1
Zhang, G.Q.2
-
8
-
-
50349087575
-
-
Wan, T., Kranakis, E., and van Oorschot, P. C. Pretty Secure BGP. Technical Report, TR-04-07, SCS. 2004. http://www. scs.carleton.ca/~kranakis/ Papers/TR-04-07.pdf.
-
Wan, T., Kranakis, E., and van Oorschot, P. C. Pretty Secure BGP. Technical Report, TR-04-07, SCS. 2004. http://www. scs.carleton.ca/~kranakis/ Papers/TR-04-07.pdf.
-
-
-
-
9
-
-
33750398837
-
Self-Organization of inter-domain routing system
-
Lu XC, Zhao JJ, Zhu PD, Dong P. Self-Organization of inter-domain routing system. Journal of Software, 2006, 17(9):1922-1932.
-
(2006)
Journal of Software
, vol.17
, Issue.9
, pp. 1922-1932
-
-
Lu, X.C.1
Zhao, J.J.2
Zhu, P.D.3
Dong, P.4
-
10
-
-
50349088003
-
-
CAIDA
-
CAIDA. http://www.caida.org/analysis/routing/astypes/.
-
-
-
-
11
-
-
50349084840
-
-
IETF Internet Draft, July 2006
-
Seo, K. Watro, R. Kong, D. Certificate Policy (CP) for the Internet IP Address and AS Number (PKI), IETF Internet Draft, July 2006, http://www.ietf.org/internet-drafts/draft-ietf-sidr-cp-02.txt.
-
Certificate Policy (CP) for the Internet IP Address and AS Number (PKI)
-
-
Seo, K.1
Watro, R.2
Kong, D.3
-
12
-
-
50349100865
-
-
The Internet as a Complex system
-
Kihong Park, The Internet as a Complex system, 2005, http://www.cs. purdue.edu/nsl/ complex.pdf.
-
(2005)
-
-
Park, K.1
-
14
-
-
0033314753
-
An Overview of PKI Trust Models
-
R. Perlman. An Overview of PKI Trust Models. IEEE Network, 1999,11-12.
-
(1999)
IEEE Network
, pp. 11-12
-
-
Perlman, R.1
-
16
-
-
0035009719
-
-
Labovitz C,Ahuja A,Wattenhofer R,Venkatachary S.The impact of Internet policy and topology on delayed routing convergence.In:Proc.of the IEEE INFOCOMM 2001. 2001. 537-546.
-
Labovitz C,Ahuja A,Wattenhofer R,Venkatachary S.The impact of Internet policy and topology on delayed routing convergence.In:Proc.of the IEEE INFOCOMM 2001. 2001. 537-546.
-
-
-
-
17
-
-
50349102564
-
-
A Survey of BGP Security. Technical report, AT&T Labs, Research
-
Kevin Butler, Toni Farley, Patrick McDaniel, Rexford J. A Survey of BGP Security. Technical report, AT&T Labs - Research. 2005. http://www. patrickmcdaniel.org /pubs/td-5ugj33.pdf.
-
(2005)
-
-
Butler, K.1
Farley, T.2
McDaniel, P.3
-
18
-
-
50349090863
-
-
NSF 04-540.Toward mathematically rigorous next-generation routing protocols for realistic network topologies. http://www.caida.org/fundmg/nets-nr/ 2005
-
NSF 04-540.Toward mathematically rigorous next-generation routing protocols for realistic network topologies. http://www.caida.org/fundmg/nets-nr/ 2005
-
-
-
|