<--- Back to Details
First PageDocument Content
Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router
Date: 2011-01-17 04:39:11
Computing
Internet
Network architecture
Routing
Internet Standards
Computer networking
IP hijacking
Internet security
Border Gateway Protocol
Internet Routing Registry
Classless Inter-Domain Routing
Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Download Document from Source Website

File Size: 393,33 KB

Share Document on Facebook

Similar Documents

Routing algorithms / Edsger W. Dijkstra / Mathematics / Game artificial intelligence / Combinatorial optimization / Search algorithms / Computing / Applied mathematics / Pathfinding / Shortest path problem / Deadlock / Routing

Efficient Traffic Routing with Progress Guarantees Stefan Blumer Manuel Eichelberger Roger Wattenhofer

DocID: 1xVZy - View Document

Internet architecture / Computing / Information and communications technology / Network architecture / OpenFlow / Networking hardware / Computer networking / Router / Routing

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

DocID: 1xVPP - View Document

Computing / Computer networking / Information and communications technology / Data transmission / Internet architecture / Internet protocols / Internet privacy / Network performance / Proxy server / Router / SOCKS / Internet protocol suite

Decoy Routing: Toward Unblockable Internet Communication Josh Karlin Daniel Ellard

DocID: 1xVLC - View Document

Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xVI1 - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document