Sciweavers

73 search results - page 1 / 15
» Securing user-controlled routing infrastructures
Sort
View
TON
2008
86views more  TON 2008»
13 years 4 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
DIAU
2000
Springer
13 years 9 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
IEEESP
2006
51views more  IEEESP 2006»
13 years 5 months ago
Toward Secure Routing Infrastructures
Doug Montgomery, Sandra Murphy
CN
2000
72views more  CN 2000»
13 years 4 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
CCR
2004
106views more  CCR 2004»
13 years 4 months ago
Beware of BGP attacks
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...
Ola Nordström, Constantinos Dovrolis