Sciweavers

65 search results - page 7 / 13
» Validation Algorithms for a Secure Internet Routing PKI
Sort
View
110
Voted
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 7 months ago
Empirical Study on Inferring BGP Routing Instability and its Location Based on Single Point Observation
As the Internet has become a communication infrastructure, inter-domain routing instabilities have become prone to serious problems. Some studies have proposed methods that infer i...
Tomohiko Ogishi, Yuichiro Hei, Shigehiro Ano, Toru...
131
Voted
CONEXT
2007
ACM
15 years 7 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
131
Voted
IMC
2004
ACM
15 years 9 months ago
Robust synchronization of software clocks across the internet
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recent...
Darryl Veitch, Satish Babu Korada, Attila Pá...
120
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
The Inframetric Model for the Internet
—A large amount of algorithms has recently been designed for the Internet under the assumption that the distance defined by the round-trip delay (RTT) is a metric. Moreover, man...
Pierre Fraigniaud, Emmanuelle Lebhar, Laurent Vien...
142
Voted
ESWS
2009
Springer
15 years 10 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller