<--- Back to Details
First PageDocument Content
Internet architecture / Computing / Information and communications technology / Network architecture / Routing / IP routing / Computer network / Router / Source routing / Wireless ad hoc network / Control plane / Link-state routing protocol
Internet architecture
Computing
Information and communications technology
Network architecture
Routing
IP routing
Computer network
Router
Source routing
Wireless ad hoc network
Control plane
Link-state routing protocol

Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 133,44 KB

Share Document on Facebook

Similar Documents

1  Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xVAh - View Document

1  Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xUCT - View Document

Leveraging Router Programmability for Traffic Matrix Computation ⇤  Giacomo Balestra‡

Leveraging Router Programmability for Traffic Matrix Computation ⇤ Giacomo Balestra‡

DocID: 1xUmh - View Document

PDF Document

DocID: 1wULk - View Document

PDF Document

DocID: 1wgdG - View Document