Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Experimental analysis of attacks against intradomain routing protocols
Journal of Computer Security
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
A verified distance vector routing protocol for protection of internet infrastructure
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Hi-index | 0.00 |
Network routing protocols work in a vulnerable environment. Unless protected by appropriate security measures, their operation can be easily subverted by intruders capable of modifying, deleting or adding false information in routing updates. This paper first analyses threats to the secure operation of inter-domain routing protocols, and then proposes various counter measures to make these protocols secure against external threats.