Sciweavers

160 search results - page 12 / 32
» Securing BGP incrementally
Sort
View
ICON
2007
IEEE
14 years 1 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
INFOCOM
2007
IEEE
14 years 1 months ago
Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup
—Next generation internet protocol, IPv6, has attracted growing attention and has been deploying worldwide. With 128-bit address, IPv6 provides an extremely large address space a...
Zhenqiang Li, Dongqu Zheng, Yan Ma
ASIACRYPT
2003
Springer
14 years 26 days ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
DCOSS
2006
Springer
13 years 11 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
13 years 11 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser