-
2
-
-
11244282960
-
Origin Authentication in Interdomain Routing
-
Washington, D.C., USA. October
-
W. Aiello, J. Ioannidis, and P. McDaniel. Origin Authentication in Interdomain Routing. In Proc. of the 10th ACM Conferences on Computer and Communication Security (CCS'03), Washington, D.C., USA. October 2003.
-
(2003)
Proc. of the 10th ACM Conferences on Computer and Communication Security (CCS'03)
-
-
Aiello, W.1
Ioannidis, J.2
McDaniel, P.3
-
5
-
-
0002738343
-
Security Problems in the TCP/IP Protocol Suite
-
April
-
S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. ACM Computer Communications Review, 19(2): 32-48, April 1989.
-
(1989)
ACM Computer Communications Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
8
-
-
35048887476
-
Short Group Signatures
-
Santa Barbara, USA. August 15-19
-
D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In Proceedings of Crypto 2004, LNCS vol 3152, pp. 41-55. Santa Barbara, USA. August 15-19, 2004.
-
(2004)
Proceedings of Crypto 2004, LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
11
-
-
0003553457
-
Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Soure Address Spoofing
-
May
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Soure Address Spoofing. RFC 2827, May 2000.
-
(2000)
RFC 2827
-
-
Ferguson, P.1
Senie, D.2
-
12
-
-
0025771853
-
Applying a Formal Analysis Technique to the CCIT X.509 Strong Two-Way Authentication Protocol
-
K. Gaarder and E. Snekkenes. Applying a Formal Analysis Technique to the CCIT X.509 Strong Two-Way Authentication Protocol. In Journal of Cryptology, 3: 81-98, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 81-98
-
-
Gaarder, K.1
Snekkenes, E.2
-
13
-
-
0034478521
-
On Inferring Autonomous System Relationships in the Internet
-
November
-
L. Gao. On Inferring Autonomous System Relationships in the Internet. In Proceedings of IEEE Global Internet, November 2000.
-
(2000)
Proceedings of IEEE Global Internet
-
-
Gao, L.1
-
14
-
-
85028743437
-
Logics for Cryptographic Protocols - Virtues and Limitations
-
IEEE Computer Society Press, Los Alamitos, California, USA
-
V.D. Gligor, R. Kailar, S. Stubblebine, and L. Gong. Logics for Cryptographic Protocols - Virtues and Limitations. In Proceedings of the Computer Security Foundations Workshop IV, pp. 219-226. IEEE Computer Society Press, Los Alamitos, California, USA. 1991.
-
(1991)
Proceedings of the Computer Security Foundations Workshop IV
, pp. 219-226
-
-
Gligor, V.D.1
Kailar, R.2
Stubblebine, S.3
Gong, L.4
-
15
-
-
85180543778
-
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
-
San Diego, USA. February
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. In Proc. of 2003 Internet Society Symposium on Network and Distributed System Security (NDSS'03), San Diego, USA. February 2003.
-
(2003)
Proc. of 2003 Internet Society Symposium on Network and Distributed System Security (NDSS'03)
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
16
-
-
4344670280
-
Deploying and Using Public Key Technology: Lessons Learned in Real Life
-
July/August
-
R. Guida, R. Stahl, T. Bunt, G. Secrest and J. Moor-cones. Deploying and Using Public Key Technology: Lessons Learned in Real Life. IEEE Security and Privacy, July/August 2004. pp. 67-71.
-
(2004)
IEEE Security and Privacy
, pp. 67-71
-
-
Guida, R.1
Stahl, R.2
Bunt, T.3
Secrest, G.4
Moor-cones, J.5
-
19
-
-
84982836904
-
Efficient Security Mechanisms for Routing Protocols
-
San Diego, USA. Feb
-
Y.C. Hu, A. Perrig, and D.B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proc. of NDSS'03, San Diego, USA. Feb 2003.
-
(2003)
Proc. of NDSS'03
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
26444521917
-
SPV: Secure Path Vector Routing for Securing BGP
-
Portland, Oregon, USA. Aug.30 Sep.3
-
Y.C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In Proc. of SIGCOMM'04, Portland, Oregon, USA. Aug.30 - Sep.3, 2004.
-
(2004)
Proc. of SIGCOMM'04
-
-
Hu, Y.C.1
Perrig, A.2
Sirbu, M.3
-
27
-
-
0012580890
-
Integration of Security in Network Routing Protocols
-
Spring
-
B. Kumar. Integration of Security in Network Routing Protocols. In ACM SIGSAC Review, 11(2): 18-25, Spring 1993.
-
(1993)
ACM SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
30
-
-
35248890091
-
Border Gateway Protocol Security Analysis
-
IETF Internet Draft, draft-murphy-bgp-vuln-00.txt. November
-
S. Murphy. Border Gateway Protocol Security Analysis. IETF Internet Draft, draft-murphy-bgp-vuln-00.txt. November 2001.
-
(2001)
-
-
Murphy, S.1
-
31
-
-
21844439293
-
BGP Security Protection
-
IETF Internet Draft, draft-murphy-bgp-protect-02.txt. Feburary
-
S. Murphy. BGP Security Protection. IETF Internet Draft, draft-murphy-bgp-protect-02.txt. Feburary 2002.
-
(2002)
-
-
Murphy, S.1
-
33
-
-
85180406557
-
-
University of Oregon - Looking Glass. http://antc.uoregon.edu/route-views/
-
-
-
-
39
-
-
83255186150
-
Listen and Whisper: Security Mechanisms for BGP
-
San Francisco, CA, USA. March
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proc. of the First Symposium on Networked Systems Design and Implementation (NSDI'04), San Francisco, CA, USA. March 2004.
-
(2004)
Proc. of the First Symposium on Networked Systems Design and Implementation (NSDI'04)
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
41
-
-
27544500277
-
Securing BGP Through Secure Origin BGP (soBGP)
-
September
-
R. White. Securing BGP Through Secure Origin BGP (soBGP). In The Internet Protocol Journal, 6(3): 15-22, September 2003.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 15-22
-
-
White, R.1
|