Sciweavers

757 search results - page 99 / 152
» How secure are secure interdomain routing protocols
Sort
View
CNSR
2006
IEEE
14 years 2 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
CCS
2008
ACM
13 years 10 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
SIGMETRICS
2008
ACM
13 years 7 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
ICTAI
1999
IEEE
14 years 6 days ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref
SECURWARE
2008
IEEE
14 years 2 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand