<--- Back to Details
First PageDocument Content
Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system
Date: 2015-06-01 09:06:13
Routing protocols
Public-key cryptography
Hashing
Cryptography
Key management
Border Gateway Protocol
Cryptographic hash function
Hash chain
Merkle tree
RSA
Man-in-the-middle attack
Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 246,61 KB

Share Document on Facebook

Similar Documents

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1uOJq - View Document

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1uyBr - View Document

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1tJRq - View Document

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Weitz Doug Woos

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Weitz Doug Woos

DocID: 1tGFv - View Document

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Doug Weitz

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Doug Weitz

DocID: 1t2Vi - View Document