First Page | Document Content | |
---|---|---|
Date: 2014-10-08 09:38:20Internet Computing Network architecture Internet Standards Internet protocols Internet security Routing Secure communication Border Gateway Protocol IP hijacking Tor Traffic analysis | Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACTAdd to Reading ListSource URL: www.vanbever.euDownload Document from Source WebsiteFile Size: 985,30 KBShare Document on Facebook |
Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um eDocID: 1uOJq - View Document | |
Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um eDocID: 1uyBr - View Document | |
Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um eDocID: 1tJRq - View Document | |
Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Weitz Doug WoosDocID: 1tGFv - View Document | |
Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Doug WeitzDocID: 1t2Vi - View Document |