Sciweavers

757 search results - page 29 / 152
» How secure are secure interdomain routing protocols
Sort
View
DSN
2009
IEEE
13 years 11 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
IPOM
2007
Springer
14 years 1 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address preï¬x origin in our BGP operations has become a major security concern. This critical problem can be stated simply as â€...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
COLCOM
2007
IEEE
14 years 2 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, conï¬dentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
WICON
2008
13 years 9 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
COMCOM
2000
97views more  COMCOM 2000»
13 years 7 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau