Back to Results
First PageMeta Content
Computing / Border Gateway Protocol / Routing / Link-state routing protocol / Router / Network architecture / Routing protocols / Internet


Having your Cake and Eating it too: Routing Security with Privacy Protections Alexander J. T. Gurney Andreas Haeberlen
Add to Reading List

Document Date: 2011-10-15 19:00:53


Open Document

File Size: 309,07 KB

Share Result on Facebook

City

Cambridge / /

Company

Ni / To / IEEE Journal / Computer-Communication Networks / /

Country

Belgium / United States / /

Currency

USD / /

Event

Reorganization / /

Facility

Privacy Protections Alexander J. T. Gurney Andreas Haeberlen Wenchao Zhou University of Pennsylvania University of Pennsylvania University of Pennsylvania Micah Sherr Boon Thau Loo Georgetown University University of Pennsylvania ABSTRACT / /

IndustryTerm

Secure border gateway protocol / link-state protocol / Internet Service Providers / actual network / domain-specific solution / existential operator / interdomain routing protocol / network-level protocols / strawman solution / internet interconnections / malicious network / minimum operator / neighbor network / incorrect networks / zero-knowledge proof systems / Network operators / /

Organization

University of Pennsylvania University / National Science Foundation / Georgetown University University / Computer Systems Organization / /

Person

A. Jaggard / V / /

Position

disjunctive internet cartographer / Internetworking General / /

Product

Sonim XP1 Cellular Phone / /

Technology

cryptography / even SMC protocols / routing protocol / network-level protocols / Secure border gateway protocol / public key / peer-to-peer / interdomain routing protocol / pdf / Network Protocols / link-state protocol / /

URL

http /

SocialTag