<--- Back to Details
First PageDocument Content
Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol
Date: 2015-06-01 09:06:12
Routing protocols
Hashing
Error detection and correction
Routing algorithms
Distributed data storage
Hash chain
Routing
Link-state routing protocol
Destination-Sequenced Distance Vector routing
Merkle tree
Cryptographic hash function
Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 236,31 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document