메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Pretty Secure BGP (psBGP)

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCE; GATEWAYS (COMPUTER NETWORKS); NETWORK SECURITY; ROUTING PROTOCOLS;

EID: 85180417570     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (71)

References (42)
  • 4
    • 34548793272 scopus 로고    scopus 로고
    • Generic Threats to Routing Protocols
    • April 13
    • A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols. Internet Draft, April 13, 2004.
    • (2004) Internet Draft
    • Barbir, A.1    Murphy, S.2    Yang, Y.3
  • 5
    • 0002738343 scopus 로고
    • Security Problems in the TCP/IP Protocol Suite
    • April
    • S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. ACM Computer Communications Review, 19(2): 32-48, April 1989.
    • (1989) ACM Computer Communications Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 8
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Santa Barbara, USA. August 15-19
    • D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In Proceedings of Crypto 2004, LNCS vol 3152, pp. 41-55. Santa Barbara, USA. August 15-19, 2004.
    • (2004) Proceedings of Crypto 2004, LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 11
    • 0003553457 scopus 로고    scopus 로고
    • Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Soure Address Spoofing
    • May
    • P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Soure Address Spoofing. RFC 2827, May 2000.
    • (2000) RFC 2827
    • Ferguson, P.1    Senie, D.2
  • 12
    • 0025771853 scopus 로고
    • Applying a Formal Analysis Technique to the CCIT X.509 Strong Two-Way Authentication Protocol
    • K. Gaarder and E. Snekkenes. Applying a Formal Analysis Technique to the CCIT X.509 Strong Two-Way Authentication Protocol. In Journal of Cryptology, 3: 81-98, 1991.
    • (1991) Journal of Cryptology , vol.3 , pp. 81-98
    • Gaarder, K.1    Snekkenes, E.2
  • 13
    • 0034478521 scopus 로고    scopus 로고
    • On Inferring Autonomous System Relationships in the Internet
    • November
    • L. Gao. On Inferring Autonomous System Relationships in the Internet. In Proceedings of IEEE Global Internet, November 2000.
    • (2000) Proceedings of IEEE Global Internet
    • Gao, L.1
  • 16
    • 4344670280 scopus 로고    scopus 로고
    • Deploying and Using Public Key Technology: Lessons Learned in Real Life
    • July/August
    • R. Guida, R. Stahl, T. Bunt, G. Secrest and J. Moor-cones. Deploying and Using Public Key Technology: Lessons Learned in Real Life. IEEE Security and Privacy, July/August 2004. pp. 67-71.
    • (2004) IEEE Security and Privacy , pp. 67-71
    • Guida, R.1    Stahl, R.2    Bunt, T.3    Secrest, G.4    Moor-cones, J.5
  • 19
    • 84982836904 scopus 로고    scopus 로고
    • Efficient Security Mechanisms for Routing Protocols
    • San Diego, USA. Feb
    • Y.C. Hu, A. Perrig, and D.B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proc. of NDSS'03, San Diego, USA. Feb 2003.
    • (2003) Proc. of NDSS'03
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 20
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure Path Vector Routing for Securing BGP
    • Portland, Oregon, USA. Aug.30 Sep.3
    • Y.C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In Proc. of SIGCOMM'04, Portland, Oregon, USA. Aug.30 - Sep.3, 2004.
    • (2004) Proc. of SIGCOMM'04
    • Hu, Y.C.1    Perrig, A.2    Sirbu, M.3
  • 27
    • 0012580890 scopus 로고
    • Integration of Security in Network Routing Protocols
    • Spring
    • B. Kumar. Integration of Security in Network Routing Protocols. In ACM SIGSAC Review, 11(2): 18-25, Spring 1993.
    • (1993) ACM SIGSAC Review , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 30
    • 35248890091 scopus 로고    scopus 로고
    • Border Gateway Protocol Security Analysis
    • IETF Internet Draft, draft-murphy-bgp-vuln-00.txt. November
    • S. Murphy. Border Gateway Protocol Security Analysis. IETF Internet Draft, draft-murphy-bgp-vuln-00.txt. November 2001.
    • (2001)
    • Murphy, S.1
  • 31
    • 21844439293 scopus 로고    scopus 로고
    • BGP Security Protection
    • IETF Internet Draft, draft-murphy-bgp-protect-02.txt. Feburary
    • S. Murphy. BGP Security Protection. IETF Internet Draft, draft-murphy-bgp-protect-02.txt. Feburary 2002.
    • (2002)
    • Murphy, S.1
  • 33
    • 85180406557 scopus 로고    scopus 로고
    • University of Oregon - Looking Glass. http://antc.uoregon.edu/route-views/
  • 41
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP Through Secure Origin BGP (soBGP)
    • September
    • R. White. Securing BGP Through Secure Origin BGP (soBGP). In The Internet Protocol Journal, 6(3): 15-22, September 2003.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 15-22
    • White, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.