Sciweavers

IPCCC
2005
IEEE
14 years 5 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CONEXT
2006
ACM
14 years 5 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 5 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
GLOBECOM
2006
IEEE
14 years 5 months ago
XCP-i : eXplicit Control Protocol for Heterogeneous Inter-Networking of High-Speed Networks
— XCP is a transport protocol that uses the assistance of specialized routers to very accurately determine the available bandwidth along the path from the source to the destinati...
Dino M. López-Pacheco, CongDuc Pham, Lauren...
DSN
2006
IEEE
14 years 5 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
ICICS
2007
Springer
14 years 5 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
INFOCOM
2008
IEEE
14 years 5 months ago
Making Large Scale Deployment of RCP Practical for Real Networks
—We recently proposed the Rate Control Protocol (RCP) as a way to minimize download times (or flow-completion times). Simulations suggest that if RCP were widely deployed, downl...
Chia-Hui Tai, Jiang Zhu, Nandita Dukkipati
PAM
2010
Springer
14 years 6 months ago
Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers
Abstract. To describe, analyze, and model the topological and structural characteristics of the Internet, researchers use Internet maps constructed at the router or autonomous syst...
Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov...