Integration of security in network routing protocols
ACM SIGSAC Review
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Self-stabilizing systems in spite of distributed control
Communications of the ACM
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Enhanced Certificate Revocation System
Enhanced Certificate Revocation System
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Real-time protocol analysis for detecting link-state routing protocol attacks
ACM Transactions on Information and System Security (TISSEC)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
A new approach for building secure applications based on internet infrastructure
International Journal of Computer Applications in Technology
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Secure and Efficient Data Collection in Sensor Networks
Wireless Systems and Mobility in Next Generation Internet
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
End-host authentication and authorization for middleboxes based on a cryptographic namespace
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
Security in link-state routing protocols is a feature that is both desirable and costly. This paper examines the cost of security and presents two techniques for efficient and secure processing of link state updates. The first technique is geared towards a relatively stable internetwork environment while the second is designed with a more volatile environment in mind.