Back to Results
First PageMeta Content
Network performance / Computer networking / Packet switching / Goodput / Ingress router / Throughput / Router / Transmission Control Protocol / Routing protocols / Computing / Network architecture / Data


Lightweight Source Authentication and Path Validation Tiffany Hyun-Jin Kim Cristina Basescu Limin Jia
Add to Reading List

Document Date: 2014-11-11 20:30:18


Open Document

File Size: 255,79 KB

Share Result on Facebook

City

ESSION / Chicago / /

Company

Computer-Communication Networks / Extended-OPT / CBC / AMD CPUs / Qualcomm / Intel / the AES / OPT / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

IndustryTerm

software router code / probabilistic auditing / secure protocols / intermediary routers / software-based implementations / malicious routers / software router / consent server / downstream routers / honest routers / low-overhead protocols / help intermediate routers / ingress router / downstream router / malicious intermediate router / path validation protocols / correct router / per-packet processing / user-level packet processing engine5 / Internet architecture proposals / setup protocol / malicious router / proposed solutions / packet processing / software routers / honest intermediary router / intermediate router / intermediate routers / benign router / honest router / adjacent malicious routers / software router implementation / /

OperatingSystem

Linux / Ubuntu / L3 / DoS / /

Organization

Trust On First Use / /

Person

ASH PVF PVF / Chun Hu / Soo Bum Lee / Tiffany Hyun-Jin Kim / Adrian Perrig / Jia CyLab / /

Position

administrator / Forward / Private / /

Product

DRKey / RSA-2048 / AESni / packet / OV / Figure / Section / Packet injection / /

ProgrammingLanguage

K / /

Technology

intermediate routers / OVs help intermediate routers / correct router / RAM / low-overhead protocols / Entity Path length Latency Router / BGP protocol / forwarding protocol / honest intermediary router / two routers / malicious routers / 3.3 OPT Protocol / Linux / key setup protocol / injecting router / honest routers / PKI / block cipher / OPT router / Extended-DRKey protocol / cloning / private key / ICING routers / MTU / one router / secret key / Misbehaving router / SSL / honest router / TCP/IP / ingress router / OPT routers / adjacent malicious routers / 2 routers / downstream router / path validation protocols / encryption / Ethernet / sending router / intermediate router / cryptography / one intermediate router / malicious router / routing protocol / software router / DRKey protocols / public key / load balancing / Each router / previous router / benign router / public-key encryption / forwarding routers / two malicious routers / received IP Header OPT Header TCP Header Algorithm / private key Encryption / ISP / PROTOCOL DESCRIPTION The DRKey protocols / OPT protocols / software routers / second router / service level agreement / malicious intermediate router / downstream routers / Authenticated encryption / possibly misbehaving routers / Locating routers / ICING router / /

URL

http /

SocialTag